"Workflow" sounds better than "itinerary," and that poetic lilt is important when trying to get your workforce on board with a tactical improvement program.
It was a small security conference, but I'll take it. It gives me time to listen to people in their everyday work whose business is suffering from a lack of healthy communication.
The tech press often waxes poetic about the latest clever, automated, exploit "bot." But a veteran security engineer uses the oldest tricks in the book to prove you don't need bots to take down a network.
Already, people are happy to give away elements of their personal data to private industries for marketing purposes. Why does the U.S. Government bother with eavesdropping for the same data?
Bloggers acting on public information do have a tendency to get the facts wrong. But Dropbox's effort to correct them, spearheaded by someone other than its PR team, pointed to some uglier facts.
Larry Dignan, ZDNet' s Editor-In-Chief, says enterprise mobility management is a thick soup of components that range from security to document management.
One of the main complaints about pre-loading business smartphones with mobile productivity apps has been addressed, with an option that moves authentication inside the corporate network.
If security bugs like last month's Xen hypervisor vulnerability continue to be mitigated with minimal damage, and disaster totally avoided, will there be anything left to panic about?
It's obvious enough that the current system of attaching files to emails in such a way that they can only become accessible by opening them through the operating system has been dangerous for over a decade-and-a-half and has to be replaced.
The Internet is becoming a rat's nest, or a bat cave, or some other equally smelly metaphor, for would-be perpetrators, says Europol. And by the way, one of those perpetrators may be right next to you.