No Author

Articles by No Author

Lawful Access FAQ

Lawful access is a specialized tool used to investigate serious crimes, such as drug trafficking, money laundering, smuggling, child pornography, and murder. Lawful interception of communications is also an essential tool for the investigation of threats to national security, such as terrorism. Lawful access can only be used with legal authority, i.e. a warrant or an authorization to intercept private communications, issued by a judge under specific circumstances.

Tillsonburg videos landing page

Diane Beattie, Integrated VP and CIO, Information Management, LHSC and SJHCWatch Diane BeattieBeattie noted that this is one of the most exciting times for...

Calling a change in the outsourcing mart

Outsourcing is an extraordinarily complex process, and the anticipated benefits often fail to materialize. Based on the evidence from our research, Deloitte Consulting is calling a change in the outsourcing market.

Editor and Publisher messages

This is a beautiful issue, from the butterfly on the cover to the content that covers a great deal of the Lac Carling proceedings for 2005.

News Briefs

Like airborne viruses, instant messaging worms are fledglings, but very much on the rise. These new worms are also proving that once inside a corporate network they can be just as destructive, if not more so, than traditional e-mail attacks. E-mail remains the most widely used and destructive vehicle for spreading viruses and worms over the Internet, but the first three months of 2005 saw a rise in the number of worms using IM to propagate.

Canadians’ online dealings with govt up 400 per cent

Canadians’ online dealings with govt up 400 per centTHE INTERNET IS becoming the Canadians’ preferred method for accessing government services, according to a recent...

Accenture acquires NA health practice

ACCENTURE HAS AGREED to acquire IT services and business consultancy Capgemini

Tech News

Threads

Dev Bytes

Wireless Briefs

Visio 2000 enterprise

ESRI names winners