Category Archives: x[ Archived Content ]x

Do we get the IT security we deserve?

In recent weeks we have run a number of connected “articles” about IT security. In[...]

Gloomy outlook from BT/Independent’s SustainIT forum

Yesterday’s forum run by BT and the Independent was a culmination of a ’multi-channel media[...]

SOA Benefits Revisited – Assessing payback in the downturn

Audience – IT & Business professionals Occasion – Computing Web Seminar – April 2009 Presenter(s)[...]

Security in the clouds – or clouds in security?

Cloud Computing’ is the marketing term of the moment, despite lacking a formal definition (this[...]

Salesforce/Twitter: genuine help or fake sincerity?

Interesting that Marc Benioff (boss of Salesforce.com) should choose to announce the addition of Twitter[...]

Threats and how to counter them

Freeform Dynamics recently researched business attitudes to security threats and identified a number of organisations[...]

Ready-to-go project management with Teamwork

As a journalist, I used to spend about seventy percent of my time on the[...]

Green IT for Dummies: HP/Freeform Dynamics special edition

Eleven months ago, to the day, Freeform Dynamics and Wiley put the wheels in motion[...]

Web 2.0 + KM = a winner

Artificial intelligence, expert systems and knowledge management – or AI, ES and KM to the[...]

IT: Set your sights high

Because business functions depend on IT systems, in this downturn IT budgets are unlikely to[...]

Chargeback – its time has come

The fact that most of the world is currently undergoing a challenging time, as a[...]

The eroding enterprise boundary – Lock Down and Open Up

Businesses today function effectively only when the organisation supports effective collaboration between its staff and[...]

Cisco and NASA to save the planet?

You can't beat a good slogan for grabbing attention. And, to prove it, here I[...]

Cloud computing – from myth to reality

This article is hosted on an external website. Please click here to view it in[...]

Securing the corporation

In the past couple of articles we have considered why security is important and what[...]

IBM – getting sentimental?

In our online, data driven society, a vast amount of opinion transfer goes on every[...]

BT’s Tuppen: Green carrots or sticks

Dr Chris Tuppen is one of those people you take to immediately. He's enthusiastic, kindly[...]

What are the security threats? – Sophisticated Malware or just People?

This article is hosted on an external website. Please click here to view it in[...]

The Business Value of Social Networking

Say “social networking” to many people and they equate it to “time wasting”.Within an organisation,[...]

The Business Value of Social Networking

Audience – Business/IT Occasion – Annual Communications Management Association conference 2009 Presenter – David Tebbutt[...]

Social tools don’t have to disrupt

This morning my (other) blog emailed me to say that ‘Steve’ had commented on a[...]

Making IT security matter

This article is hosted on an external website. Please click here to view it in[...]

IT Shouldn’t Sell Itself Short

This article is hosted on an external website. Please click here to view it in[...]

Thoughts from IBM Pulse : 1

Weirdly enough, I feel sorry for Vegas right now. The very ideas that could save[...]