Bradner: Third annual scare story about the national power system As far as the headline writers at the Wall Street Journal were concerned the battle was over and the U.S. electricity grid was under control by the enemy -- "Electricity Grid in U.S. Penetrated by Spies." There has been a bunch of speculation on the Web and in the blogosphere over just why this story came out when it did - this sort of thing is a fertile area for conspiracy theorists. But I'm more interested in the underlying issue and why it's not actually getting the attention it should. Johnson: Managing mobility requires casting a wide net Mobility represents one of the fastest-growing line items in most IT budgets as an increasing number of employees request and receive mobile services. Yet most companies don't even have a mobility strategy: Only 40% of the IT pros I work with have deployed one (though another 40% say they're developing one). Antonopoulos: UC security: When the shoe doesn't fit -- compress the foot If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in many different ... Insider Threat: Can the status quo threaten your LAN? In times of economic crisis people tend to seek the safety and security of the status quo. "Doing what you've always done, and what everyone else is doing, is the most prudent course," goes the thinking. Gearhead: Analyzing Twitter with Excel, Part 2 After looking at the update of a product that Mark Gibbs was, to put it mildly, rather critical of, he continues his self-appointed task of using Excel to analyze Twitter data. |
No comments:
Post a Comment