Monthly Archives: August 2008

Neither Fire nor Water Can Harm These ioSafe Drives

0
UPDATED: If you ever have the urge to literally bake a computer hard drive at high temperature and see if it survives to deliver...

Google App Engine to Take on Google’s Jaiku as New Tenant

0
UPDATE: I added a response from Google.When Google bought Jaiku last October it spawned a great deal of talk about whether Google would be...

A Qwest for Growth

0
As vice president and chief technology officer at Qwest, Pieter Poll faces the challenge of moving the carrier with a 14-state footprint into the...

How CIOs Can Encourage Innovative Enterprise Mobility–Top Mistakes to Avoid

0
/images/stories/70x50/bug_knowledgecenter_70x70_(2).jpgLet's assume that today's CIOs, along with their IT staff, are not viewing smart phones as just another "cell phone" that has little more...

How to Use Board Portals to Enhance Corporate Governance

0
/images/stories/70x50/bug_knowledgecenter_70x70_%282%29.jpgPeople often wonder what technology has to do with corporate governance, and how any piece of software can assist in matters of ethics and...

How to Use Honeypots to Improve Your Network Security

0
Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used to protect communication networks include firewalls, encryption...

INSIDE MOBILE: GSMA Mobile World Congress–Trends in Mobile Location-Based Services

0
/images/stories/knowledge_center/analysts_corner.gif I am grateful to have been invited by the GSM Association to lead a session on the future of mobile location-based services, or...

INSIDE MOBILE: Mobile Marketing Using Camera Phone 2D Bar Code Scanning

0
/images/stories/knowledge_center/analysts_corner.gifThe CTIA recently asked me to moderate a very interesting panel session on Camera Phone 2D (two-dimensional) Bar Code Scanning. The session was held...

How to Increase Application Security through Secure Software Development

0
/images/stories/70x50/bug_knowledgecenter_70x70_(2).jpgGenerally, we think of security in either of two ways: as an operational IT issue focused on defending our computers and networks from attackers...

Gartner: Compellent Is Fastest-Growing SAN Company

0
Yep. Looks like Gartner, that internationally respected IT analyzer famous for its Magic Quandrants, has reported more proof of something The Station has been...