Vacations serve as mini tests to prove if a department can function when key players are away. That's the theory, anyway. In reality, IT departments sometimes flunk that test in a big way
Managers are less concerned with peccadilloes like nail-biting and leg-jiggling than with bigger-picture challenges like staying on task, becoming better organized and thinking strategically
The City of Windsor's executive director of IT offers his comments on a story about vendor relationship management from our U.S. sister publications. Can you trust the firms you work with?
Is it really possible to develop anti-spam solutions for every spam trick? Almost certainly not. But, without the research that is being carried out today, spam might be a whole lot worse. Here is a list of a dozen research projects that focus on new technology and techniques to stop spam of all kinds. This list contains select papers made public at the Fourth Conference on Email and Anti-Spam (CEAS 2007). The President of CEAS is Gordon V. Cormack, Professor at the David R. Cheriton School of Computer Science at the University of Waterloo.
In light of the increasing number of identity theft victims, the Identity Theft Enforcement and Restitution Act of 2007 was introduced by two U.S. senators last week. The Act proposes adding protections for consumers who fall victim to identity theft to the existing bill focused on data privacy and security that passed the Senate Judiciary Committee in May.
The function of information security is splitting into two, with security technology implementation moving back into the IT department and the administration of information security becoming a management issue.