Posts By Author: Brett Hodgson

Is Mobility the End of the Mainframe?
Mobility

Consumer devices and applications are more technologically advanced than their corporate device counterparts. Is this then the death knell for the high-end server?

Posted by: on March 13th, 2012


Down Under: Internet Trumps Bricks and Mortar as National Infrastructure to be Secured
Security

What constitutes national infrastructure has changed from something that was simply a physical structure, to something that is critical to communication.

Posted by: on June 7th, 2011


Embracing ‘rogue’ technology
Security

As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?As younger staff enter the workforce, it is inevitable that employees will demand access to Web 2.0 apps. How can IT manage potential security risks?

Posted by: on November 16th, 2010


Voxy.co.nz Examines the Implications of "BYOC"
Disruptive IT Trends

David Silversmith quotes Sam Gross in a story about consumerization of IT.

Posted by: on August 31st, 2010


<< Back


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.