Blogs

Previous Page 4 of 6 Next
All Pages: 1 2 3 4 5 6
Public Sector IT: What went wrong with £234m C-Nomis IT project to Public Sector IT: What MPs said about State IT projects in 1984
Public Sector IT: The NPfIT and Cézanne compared to Public Sector IT: BSkyB v EDS - HP restates profits 3 weeks after announcing them
Public Sector IT: A terrible price for the Government's love of IT complexity? to Public Sector IT: Microsoft launches HealthVault - your personal health record?
Public Sector IT: Trisha Greenhalgh on Summary Care Record - where does the truth lie? to Public Sector IT: Southwest One emits hot air after near-collapse
Public Sector IT: Open source helicopters trivialize Europe's ODF troubles to Public Sector IT: Courting failure - using an IT programme to bring about organisational changes that have not already been agreed
Public Sector IT: Richard Granger, head of NHS IT - "... Ridiculous to imagine that halfway through a ten-year programme you would only be doing the same things as you set out five years ago..." to Public Sector IT: GDS: the devil is in the detail
Public Sector IT: When IT contracts become a "once in a generation" thing--why do councils continue to sign long outsourcing deals with single suppliers? to Quality Assurance and Project Management: 10 Skills to make a perfect Project Manager
Quality Assurance and Project Management: 15 checkpoints for a Project Manager at the start of a new Project to Quality Assurance and Project Management: Six indicators for a project manager - of their downfall (or failure) in project management
Quality Assurance and Project Management: Dear software developer – what is your mileage? to Quality Assurance and Project Management: Project Management and Project Measurement
Quality Assurance and Project Management: Project Management and Project Estimation to Quality Assurance and Project Management: Business Value And Sustenance
Quality Assurance and Project Management: Business Value And Its Consistency to Quality Assurance and Project Management: Top Twenty Pitfalls in Project Management
Quality Assurance and Project Management: Why Does A Project Manager Need A Break From the Project to Quality Assurance and Project Management: If You Are Still Following Waterfall Then You Are Certain To Fall
Quality Assurance and Project Management: 5 Points That Make Software Project Similar To Love Making to Quality Assurance and Project Management: Gross Project Happiness
Quality Assurance and Project Management: Check If Your Ongoing Project Team Is Living As Prisoners Of Fear to Quality Assurance and Project Management: Why Date Constrained Projects Go Uncontrolled?
Quality Assurance and Project Management: 3 Critical Weapons For Winning A Battle Called Project Management to Quality Assurance and Project Management: Google-Raven Aerostar Project Loon Meets Its First Milestone In Time
Quality Assurance and Project Management: Why Projects Fail: Top 10 Reasons: ProjectManager to Quality Assurance and Project Management: Every Project Manager Must Be A Change Manager
Quality Assurance and Project Management: Five Tips For Handling #Change Effectively #ChangeManagement to Quality Assurance and Project Management: Happy New Year 2016
Quality Assurance and Project Management: Manager 2016: 20 Traits To Watch And Analyze - Part I to Quocirca Insights: ECM - or Emergency! Can't Manage?
Quocirca Insights: I did something wrong - and Government IT did not help me to Quocirca Insights: Securing joined-up government: the UK's Public Service Network (PSN)
Quocirca Insights: Masters of Machines II - lifting the fog of ignorance in IT management to Read all about IT!: It's a snow news day...
Read all about IT!: How to get Digital Britain moving to Read all about IT!: Windows Phone 7 makes consumer king. But what about business?
Read all about IT!: Google MD on Apple: 'Open source will win' to Read all about IT!: Will you be cut off from the Web today?
Read all about IT!: Twitter can be dangerous to business: sport celebs show why to Regulatory Reality: Dodd-Frank Section 165(d) : Is this really what was needed?
Regulatory Reality: Does everyone value their privacy or is it just me? to Risk Management with Stuart King and Duncan Hart: Building an information security strategy
Risk Management with Stuart King and Duncan Hart: A new secure software special interest group to Risk Management with Stuart King and Duncan Hart: Salesforce.com Phishing & Security Awareness
Risk Management with Stuart King and Duncan Hart: Bot Master Banged to Rights to Risk Management with Stuart King and Duncan Hart: Clear communications
Risk Management with Stuart King and Duncan Hart: We are the weakest link to Risk Management with Stuart King and Duncan Hart: Security Posture Metrics
Risk Management with Stuart King and Duncan Hart: PCI Compliance - dispelling some common myths to Risk Management with Stuart King and Duncan Hart: Security, scale and functionality - Part 3: Functionality
Risk Management with Stuart King and Duncan Hart: Far from smart phones to RTFM Education – Virtualization, VMware, Citrix: APC PowerChute Network Shutdown Installation
RTFM Education – Virtualization, VMware, Citrix: RTFM Education gets listed on VMware’s Blog Roll to RTFM Education – Virtualization, VMware, Citrix: Alex Mittell releases free backup script
RTFM Education – Virtualization, VMware, Citrix: Eric Sloof on VMware Convertor to RTFM Education – Virtualization, VMware, Citrix: IET – is it really as bad as it all seems
RTFM Education – Virtualization, VMware, Citrix: Team Fusion to RTFM Education – Virtualization, VMware, Citrix: VDM and ADAM
RTFM Education – Virtualization, VMware, Citrix: Hyper-V Integration Services Requires a Newer Version of Windows Vista… to RTFM Education – Virtualization, VMware, Citrix: PowersHell Book
RTFM Education – Virtualization, VMware, Citrix: VMware’s Big Announcement to RTFM Education – Virtualization, VMware, Citrix: VMware vSphere4 Enterprise Lives…
RTFM Education – Virtualization, VMware, Citrix: SRM 4.0 First Look to RTFM Education – Virtualization, VMware, Citrix: Opps! Upgrading VMware Tools in a virtual desktop causes PCoIP connections to fail
RTFM Education – Virtualization, VMware, Citrix: ESX 4.0 Update 2 (in)Compatibility with Cisco Nexus 1000V Virtual Ethernet Module to RTFM Education – Virtualization, VMware, Citrix: Crushing Urban Myths: VMware cost way too much?
RTFM Education – Virtualization, VMware, Citrix: Useful VMware External Links to RTFM Education – Virtualization, VMware, Citrix: And the Swagbag Winner Is…
RTFM Education – Virtualization, VMware, Citrix: Week 1: The VMTN Subscription Campaign – Blog Roll to SAP Watch: Food for thought on SAP vs. Oracle
SAP Watch: Special Report: Breaking into SAP consulting to SAP Watch: SAP and H1B visas: What an H1B increase would mean
SAP Watch: Great SAP Leaders Among Us contest update to SAP Watch: SAPPHIRE preview: Cool ASUG sessions
SAP Watch: Business Objects and data quality problems to SAP Watch: Easing your fears of SAP virtualization support
SAP Watch: What does SAP have to say about the Oracle-Sun deal? to SAP Watch: SAP, Google and geospatial analytics
SAP Watch: How secure is data in the cloud? to SAS 70: Is pre-boot authentication required? SAS70
SAS 70: Successful traits of a CIO equal successful SAS70 audits (Part 1) – SAS 70 to SBS 2003 and beyond: Server 2008 HyperV, HP BL 480c and failover with a MSA 2012i
SBS 2003 and beyond: Windows 2008 R2 to I.T. Security and Linux Administration: Port Checker
I.T. Security and Linux Administration: Magento and You to I.T. Security and Linux Administration: [Python] Processing Credit Cards Part 1 (Intro)
I.T. Security and Linux Administration: [Python] Processing Credit Cards Part 2 (Add A Client) to I.T. Security and Linux Administration: Create Your Own Two-Factor Authentication System: Block Incoming Calls
I.T. Security and Linux Administration: Create Your Own Two-Factor Authentication System: Saving Tokens to Security Bytes: Free online fraud toolkits proliferate accross the Web
Security Bytes: Major spike in activity on TCP 5168, SANS says to Security Bytes: Haute Secure launch moves browser security front and center in fight against malware
Security Bytes: Vulnerability auction site undermined by free exploits to Security Bytes: Researcher warns of Citrix flaws
Security Bytes: VeriSign in dispute over news content to Security Bytes: Adobe .pdf attacks multiply
Security Bytes: Conference aims to bring together Bay Area security community to Security Bytes: New media Trojan on the prowl
Security Bytes: DNS flaws called overblown by researcher to Security Bytes: Security bloggers, podcasters get day in sun
Security Bytes: LogLogic-Exaprotect deal reflects SIEM-log management bond to Security Bytes: Adobe releases Flash Player security update
Security Bytes: Malware exploiting Windows Help Center vulnerability to Security Bytes: Struggling to maintain compliance amidst conflicting priorities
Security Bytes: OpenDNS hires Websense CTO to guide enterprise DNS security services to Security Corner: Phlashing Attack Can Damage Systems Beyond Repair
Security Corner: How to Secure Your Computer: Maxim #10 to Security Corner: Foxit Reader Contains Multiple Vulnerabilities
Security Corner: FAA Gives PKWare's SecureZip Stamp of Approval to Security Corner: Information Security? Heaven Help Us!
Security Corner: Web 2.0 Security: Corporate Espionage to Security Corner: Vulnerability in Windows Shell Could Allow Remote Code Execution
Security Corner: Secunia Half Year Report 2010 Paints a Bleak Picture to Security Corner: Facebook Security Threats Continue to Grow
Security Corner: Video: Security "To-Duhs" List to Security Corner: Why you should stop posting these five things on Facebook
Security Corner: Yubico delivers secure two-factor authentication for Gmail and Google Apps to Security Corner: A cryptography contest
Security Corner: Cryptography contest solution to Security Corner: Keeping your kids safe online
Security Corner: Shhhh! Your PC is telling someone its secrets (keys, that is) to Security Corner: PayPal proactive security measures
Security Corner: Microsoft sues bogus tech support companies to The Security Detail: Mac Scareware Trail Leads Back to Russian Firm
The Security Detail: How to Recognize a Social Engineering Attack to Jeff Cutler's Keys to Security: The Broken Car Window - Keep Your Valuables Out of Sight
Jeff Cutler's Keys to Security: Healthy Respect for Security - Medical Data Breaches to Security Wire Weekly: Security360: Endpoint encryption
Security Wire Weekly: Security Wire Weekly: Spam techniques to Security Wire Weekly: SWW: Wireless Insecurities
Security Wire Weekly: SWW: Dan Kaminsky at Black Hat to Security Wire Weekly: Microsoft Patch Tuesday, ActiveX risks
Security Wire Weekly: Software security threats and employee awareness training to Security Wire Weekly: Security awareness training begins with risk assessment
Security Wire Weekly: Mobile payment applications and PCI DSS to Buzz’s Blog: On Web 3.0 and the Semantic Web: The Web and Folks with Limited Vision, Part 2
Buzz’s Blog: On Web 3.0 and the Semantic Web: 3D Modeling and Animation Assets on the Web: A Web 3.0 Challenge to Server Farming: How Microsoft's licensing change does (or doesn't) affect disaster recovery
Server Farming: VMmark a server vendor leapfrog game to Server Farming: Fujitsu turns blade server on its head
Server Farming: Data center cost reduction strategies from Gartner to The Virtualization Room: Video: KVM, Xen, other virtualization platforms not interoperable
The Virtualization Room: Video: Virtualization management to The Virtualization Room: The new virtual desktop: G.HO.ST in the Shell
The Virtualization Room: Staffing and virtualization, a response to The Virtualization Room: QLogic and Microsoft taken to task for “benchmarketing” by Chris Wolf
The Virtualization Room: Importing VMDK disk files into Sun xVM VirtualBox to The Virtualization Room: Virtual appliances: What goes up can also come down
The Virtualization Room: VMware: We are not an island to The Virtualization Room: Citrix joins VMware partner program
The Virtualization Room: Dell, 3PAR, and VMware's tangled partnership web to The Virtualization Room: VMware kills cloud's promise, Red Hat says
The Virtualization Room: Red Hat Enterprise Virtualization 3 features previewed to The Virtualization Room: VMware adds Hadoop support to vSphere
The Virtualization Room: VMware hires Gartner analyst Chris Wolf as CTO, Americas to SOA Talk: The SOA-RIA intersection
SOA Talk: Oracle avoids JavaScript in RIA tools to SOA Talk: Steve Mills on Oracle and Java
SOA Talk: Control theory, the economy, BPM, event processing and hydraulic computers to SOA Talk: TIBCO buys Foresight, strenthening B2B transaction offerings and healthcare market ties
SOA Talk: BMC Software acquires Phurnace, enhances Java app deployment automation to SOA Talk: SOA sensibility
SOA Talk: Mobile apps and cloud computing may be the drivers for IT in coming years to SOA Talk: Azure adds integrating Service Bus
SOA Talk: Comment: SOA and the portfolio to SOA Talk: JBoss middleware and OpenShift unite with xPaaS offerings
SOA Talk: What will be big with SOA in 2015? to Software Quality Insights: Using EVM in waterfall, agile software projects: Hows, pros and cons
Software Quality Insights: Better security through better visualization to Software Quality Insights: Astronaut's STPCon advice: Teamwork delivers "The Right Stuff"
Software Quality Insights: STPCon wrap-up: SpeedGeeking, testing Web 2.0 applications to Software Quality Insights: Grady Booch weighs in on system of systems
Software Quality Insights: User group meetings offer opportunities for learning and networking to Software Quality Insights: Geoff Bellman at ADP West keynote: Extraordinary groups
Software Quality Insights: Ellen Gottesdiener: Requirements management in Agile vs. traditional to Software Quality Insights: Shunra releases new mobile app performance testing tool
Software Quality Insights: Strategies for Agile enterprises: Agile2012 conference coverage recap to Today's Big Picture: The IT Files - Albert Gareev - Part 1
Today's Big Picture: The IT Files - Albert Gareev - Part 2 to SQL Server with Mr. Denny: SQL CLR: The What, When, Why and How.
SQL Server with Mr. Denny: New Article: Determining SQL Server database storage requirements to SQL Server with Mr. Denny: SQL Server Experts: MS SQL beats the "ACID" test for Database Technology in Features, Ease & Cost
SQL Server with Mr. Denny: I need a secure transfer of data between SQL Servers. What are my options? to SQL Server with Mr. Denny: #SoCalCodeCamp was a blast
SQL Server with Mr. Denny: How do you source control your database, in your environment? to SQL Server with Mr. Denny: How did I ever survive without Live Sync
SQL Server with Mr. Denny: South Bay .NET User Group, thanks for having me over. to SQL Server with Mr. Denny: If you change the default instances port number, you may not be able to connect
SQL Server with Mr. Denny: EMC World Day -1 to SQL Server with Mr. Denny: Cloud and the law
SQL Server with Mr. Denny: If you are going to provide SQL Server support, you should probably know what you are doing. to SQL Server with Mr. Denny: Join Thomas LaRock and I for a little Afternoon Ignite
SQL Server with Mr. Denny: VMware Day 1 to SQL Server with Mr. Denny: SQL Saturday 111 Slide Decks