Do you want an access to a Web with no sense?
Let’s be clear form the beginning, URL filtering technologies are an essential element in the network security of a company. But IT Security has to be…
Let’s be clear form the beginning, URL filtering technologies are an essential element in the network security of a company. But IT Security has to be…
– Hello Friend n°543, you seem to be from here for a long time if I see the number of friends you have. -Yes. Indeed. –…
Edward is almost forty and works in an international company. He is a CIO respected by his peers and made himself a good reputation on the…
Today, he is again alone in the Kenyan jungle hunting insects with his camera. After some nice shots, the entomologist Dino Martins, nicknamed “Dr. Dudulittle” (Dudu…
Two weeks ago, I made a presentation in Paris on how I see the role of Enterprise 2.0 and its influence on innovation. From the beginning,…
For those who did not read my last post concerning Privacy on the web, I suggest to read this paper from Google ( and I am not a…
Private data is always a controversial subject inside an enterprise and especially if this enterprise is spread around the world where the policy on this subject…
While Painting my walls this afternoon, I was thinking about Twitter and how people could really follow efficiently more than 200 people . I wanted to…
I am analysing the danger of the new technology and their impact on the IPP (Intellectual Property protection). I will certainly post an article in the…