James Rapoza

Getting Ready for IE7

Internet Explorer 7 is due to come out in the very near future (definitely before the end of October), and those who haven't tested the browser or made sure...

The Lion and the Mice

One of the most interesting parts of Microsoft watching is the relationship that Microsoft has with all the third-party software vendors that make products for the Windows platform. It...

Phishing for Trouble

A recent study tested several popular browser-based tools for helping to protect users from phishing Web sites designed to steal their personal data. Since the study, performed by 3Sharp,...

Latest Posts

DevOps or ‘DevOops’: Three Tips for Successful DevOps

Throughout my career as an IT consultant, working with various platforms and technologies, I’ve encountered a myriad of terms pitched to me to explain...

Using Personal Data for Analytics Requires Balancing Accessibility and Security

Digital transformation of financial services is driving an increasingly automated analytics process in which personally identifiable information (PII) about borrowers is transmitted and stored...

Box’s Mark Wayland on the Importance of the Content Cloud

Remote work existed long before the COVID-19 pandemic. However, now it is part of every organization, in many cases, permanently. This fundamental change in the...

Lenovo Taps Strategic Partners for New Everything-as-a-Service and Edge Solutions

Lenovo has long been one of the tech industry’s canniest vendors in terms of building and extending strategic partnerships. So it is no surprise...

Semperis’s Mickey Bresman: How to Secure Your Active Directory

Mickey Bresman, Co-founder and CEO of Semperis, provides three tips for securing your Active Directory against cyberthreats. Among the topics we discussed: What does “identity-driven...