Article Query: Information Technology
October 6, 2011

The news of Steve Jobs’ passing was not unexpected, as anyone who follows technology news, or is a devoted Apple customer, would be familiar with his failing health and recent decision to step down from his position at the helm of Apple.  There will be, for the next several days, countless articles, blog posts, and [...]

September 15, 2011

Apparently, Netflix’s decision to raise prices by as much as 60 percent is turning into a “horror show” for the company.  Who thought otherwise?  A 60 percent rise in price, or a 50 percent cut in service, either way you look at it this was a critical mistake for Netflix. Netflix’s stock price is down [...]

September 9, 2011

United States House of Representatives members are readying a series of cybersecurity bills that are designed to enhance security on several fronts, including toughening law enforcement, assigning responsibility to the Department of Homeland Security (DHS) for federal IT and critical infrastructure security, and to lessen legal liability for private organizations that adhere to security best [...]

September 8, 2011

This evening, I ran across a reference to an article entitled, “Four Things I Want You to Remember Me By”, where author Clif Reichard lays out the professional traits he wants to be remembered for as he prepares to retire.  In the article, Clif explains why he lives by the mantra “ethics, customers, profit. Don’t [...]

September 5, 2011

It is no secret that cyber attacks are growing in complexity and severity.  In August of this year, a malware-powered cyber-reconnaissance attack, dubbed Operation Shady RAT, was reported by McAfee.  The cyber attack had been ongoing since 2006, and claimed victims across a wide spectrum of Internet connected organizations, including government agencies in the United [...]

August 23, 2011

As more incidents of hacking, theft, and data loss make the headlines this week, the question remains as to who is responsible for the lapses in Internet security that make it seemingly easy to commit these types of cyber crime.  Whether it be the public or private sector organization that was targeted, a government body, [...]

August 15, 2011

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads.  The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was [...]

August 13, 2011

It seems that the Linux community is so focused on the competition with Microsoft that any hint of the two mentioned together in an article, blog post, or tweet is immediately circulated around the Internet.  In the past day or so the news began to circulate that Wes Miller of Directions on Microsoft had tweeted [...]

July 22, 2011

It is well known that Information Technology is a fast paced and ever-changing field. New technologies, updates to software, changing standards, and adoption of emerging solutions are seemingly a weekly occurrence. With this rapid change in technology comes the need to adapt strategies and alter thought processes to align with new technical directions. Unfortunately, the [...]

July 12, 2011

If you’ve worked in the IT field for any length of time you are most likely familiar with the phrase “thrown under the bus,” which can be defined as meaning “to sacrifice; to treat as a scapegoat; to betray.”  While the exact origin of the phrase is a mystery–for those of us in the information [...]