Commentary

We have all seen or heard the security expert stand in front of the seminar audience, hold up his or her laptop and ask, "How can we make this secure?" Responses could include: encrypted files system, better passwords and physical cabling. The expert agrees with...

This past weekend, I had to reboot my washing machine. Not just turning it off and on, mind you, but a hard reboot. I pulled the power plug from the wall, waited a few moments, then plugged this so-called state-of-the-art clothes-cleaning machine back into the...

Corporate image is the art of creating true business identities, and projecting them to the subtle minds of the public, all in pursuit of capturing their trust in a name. But when there is no substance, the deal is just a sham, and suddenly, this...

Little I write about these days stirs as much feedback as my columns on the emerging social media market, the convergence of blog tools, search, social networks, and syndication technologies....

This week, Byron Glick examines the dance between IT shops and the organizations they work for. By exorcizing mismatches, miscommunications and unequal shares of power within a business, both partners in the dance can share control and succeed....