-
What is the true cost of a security breach?
Increasing cyber-criminality puts companies at risk of hacking, data breaches or other compromise. In the worst-case scenario, companies can be put…
-
Going big on training
Every enterprise knows training matters, every employee wants it and if you hope to keep your employees within the company you need to consider…
-
infobesity: digital overload needs a digital cure (part 1)
I first wrote about information overload in the 1990s. The original article has been lost, and the magazine sunk into the graveyard of old technology.
-
Orange Silicon Valley: 6 trends in IT
On the first day of our Orange blogger bus tour, we dropped in at Orange Silicon Valley. The goal of this place is to provide an interface between a…
-
The limits to Moore's Law
Here's a fantastic article from Futurity writer Danny Bradbury on the limits to Moore's Law...Moore's law was first created in 1965 to describe the…
-
Total blackout averted in sub-sea cable crisis but resilience must increase
In these challenging economic times, the last thing anyone needs is an complete internet blackout which is what Internet users were twice on the…
-
#blogbus: the white heat of technological revolution
This week I am in San Francisco on board the Orange blogger bus tour (For an explanation of what it is, check out my post and meet the bloggers on…
-
barcode 2.0 brings the world to your smartphone
Who would have thought that a small monochromatic set of squares could have such a big impact on everything from marketing to literature? QR codes-a…
-
fixed-mobile convergence, saving time and money
Many enterprises embracing FMC have done so as part of a wider assessment of their IT strategy, with discussions about other products -- for example…
-
10 steps to successful deployment of mobile applications
Mobile applications that support generic business activities such as scheduling and email have already proven their worth.
Sort by :
19 results for
Stewart Baines :
Blog post (19)