Skip the navigation

Opinion and Blogs

Latest Columns

The Internet of Things meets disruptive technologies
How will the IoT affect social, mobile, the cloud and analytics? (Insider; registration required)

Thornton May: Your privacy map is probably wrong
The privacy maps being created today are primarily designed to avoid lawsuits.

Steven J. Vaughan-Nichols: What's the best smartphone? That's the wrong question.
There is no one 'best.' All we can really do is determine the best smartphone for you.

Bart Perkins: How to keep projects on track
Here are some things that IT management can do to identify problems in a timely manner.

3 privacy violations you shouldn't worry about
There are many major threats to our privacy that we should be up in arms about, but iBeacons, Gmail scanning and Google Glass are not among them, says Mike Elgan.

A simple cure for the cybersecurity skills shortage
An approach that has worked for centuries in all sorts of industries is just as applicable to the security field.

How to create awareness of the insider threat
One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities.

Brace yourself, here comes the mobile appsplosion
Companies are engaged in a kind of arms race with competitors to see how many apps they can get everyone to use. But this aggressive push for more apps is going to end up giving users app fatigue.
See all Computerworld Authors See all Columnists

Daily out-takes from the Theater of the Absurd, IT-style, where the nasty meets the rumor, and the kernel of truth wins out. Real life IT in action. You'll laugh...but try not to cry at your desk.