Category Archives: x[ Archived Content ]x
Threats and Countermeasures – Securing the Un-securable?
Audience – Security managers and professionals Occasion – Info Security India Presenter(s) – Jon Collins[...]
Here’s to a more balanced 2008
While everyone seems to be busy making predictions about hot technologies, revolutionary industry developments, and[...]
Can software developers be protected from themselves?
This article is hosted on an external website. Please click here to view it in[...]
Rethinking social networking in 2008
This article is hosted on an external website. Please click here to view it in[...]
The Good, The Bad and The Ugly
Jon Collin’s assessment on the “the good, the bad and the ugly” of the conference[...]
Tech Barometer
About this report Every year, Freeform Dynamics conducts a survey in collaboration with our media[...]
Managing signal to noise
A couple of months ago, I decided to get stuck in a bit more to[...]
Time to rethink performance management
by Martin Atherton The financial services sector is one of the most progressive when it[...]
Avaya crosses the line
This is not going to be an in-depth post. I just wanted to put on[...]
The Future Of Virtualisation?
by Tony Lock There are few areas of IT that have developed so[...]
Has it been a week with Ubuntu already?
This article is hosted on an external website. Please click here to view it in[...]
What’s in the (Linux) box
This article is hosted on an external website. Please click here to view it in[...]
Why I’ve replaced Vista with Linux
This article is hosted on an external website. Please click here to view it in[...]
Context and social media
One of the RSS feeds I subscribe to recently threw up a post that provided[...]
Dissecting SaaS
I sometimes think I am living in a parallel universe when I get into conversations[...]
Why Do We Think Virtualization Is New?
There are very many different communities involved in IT ranging from those on the sharp-end[...]
IP PBX: A natural Linux workload?
Every now and again, I read something or hear something quoted in the media that[...]
Managing Storage – Cost, Governance, Risk and the Environment
Audience – Practitioners and managers Occasion – Plasmon prospect event Presenter(s) – Martin Atherton What[...]
IT is not broken
by Martin Atherton Although most would agree the corporate world is largely free from crisis,[...]
The S Word – Putting services at the heart of IT-Business alignment
Audience – Senior IT decision makers Occasion – Quest Forum Presenter(s) – Jon Collins This[...]
Secure Mobile Working 1.0 – Best practice security for the mobile industry
Audience – Security pros and managers Occasion – Infosec Presenter(s) – Jon Collins A presentation[...]
Security Divulgence – where’s the rub?
by Tony Lock A couple of weeks ago I attended a roundtable, organised to[...]
Mobile roaming
by Dale Vile If there is one topic that is guaranteed to raise the[...]
The ITSM view of wireless
by Dale Vile A recent online workshop on the IT service management (ITSM) practicalities[...]