Category Archives: x[ Archived Content ]x

Threats and Countermeasures – Securing the Un-securable?

Audience – Security managers and professionals Occasion – Info Security India Presenter(s) – Jon Collins[...]

Here’s to a more balanced 2008

While everyone seems to be busy making predictions about hot technologies, revolutionary industry developments, and[...]

Can software developers be protected from themselves?

This article is hosted on an external website. Please click here to view it in[...]

Rethinking social networking in 2008

This article is hosted on an external website. Please click here to view it in[...]

The Good, The Bad and The Ugly

Jon Collin’s assessment on the “the good, the bad and the ugly” of the conference[...]

Tech Barometer

About this report Every year, Freeform Dynamics conducts a survey in collaboration with our media[...]

Managing signal to noise

A couple of months ago, I decided to get stuck in a bit more to[...]

Time to rethink performance management

by Martin Atherton The financial services sector is one of the most progressive when it[...]

Avaya crosses the line

This is not going to be an in-depth post. I just wanted to put on[...]

The Future Of Virtualisation?

by Tony Lock     There are few areas of IT that have developed so[...]

Has it been a week with Ubuntu already?

This article is hosted on an external website. Please click here to view it in[...]

What’s in the (Linux) box

This article is hosted on an external website. Please click here to view it in[...]

Why I’ve replaced Vista with Linux

This article is hosted on an external website. Please click here to view it in[...]

Context and social media

One of the RSS feeds I subscribe to recently threw up a post that provided[...]

Dissecting SaaS

I sometimes think I am living in a parallel universe when I get into conversations[...]

Why Do We Think Virtualization Is New?

There are very many different communities involved in IT ranging from those on the sharp-end[...]

IP PBX: A natural Linux workload?

Every now and again, I read something or hear something quoted in the media that[...]

Managing Storage – Cost, Governance, Risk and the Environment

Audience – Practitioners and managers Occasion – Plasmon prospect event Presenter(s) – Martin Atherton What[...]

IT is not broken

by Martin Atherton Although most would agree the corporate world is largely free from crisis,[...]

The S Word – Putting services at the heart of IT-Business alignment

Audience – Senior IT decision makers Occasion – Quest Forum Presenter(s) – Jon Collins This[...]

Secure Mobile Working 1.0 – Best practice security for the mobile industry

Audience – Security pros and managers Occasion – Infosec Presenter(s) – Jon Collins A presentation[...]

Security Divulgence – where’s the rub?

by Tony Lock   A couple of weeks ago I attended a roundtable, organised to[...]

Mobile roaming

by Dale Vile   If there is one topic that is guaranteed to raise the[...]

The ITSM view of wireless

by Dale Vile   A recent online workshop on the IT service management (ITSM) practicalities[...]