Profile
Ralph DeFrangesco

Ralph DeFrangesco

Latest content from Ralph DeFrangesco

Monday Could Be a Black Day for the Cloud

27 Nov, 2009

We all know that black Friday is one of the busiest shopping days of the year. Traditionally, it's the start of the Christmas shopping season and the day that retailers go from being in the red, or...More >

The Netbook Is Dead

23 Nov, 2009

The netbook is dead and thank God for it. So what will take its place? The notebook, of course. Netbooks are those small-footprint systems that can fit in your coat pocket, or almost. They have been...More >

McAfee Releases Q3 Report on Threats

20 Nov, 2009

McAfee recently released one of my all-time favorite publications, its quarterly threat report. This report is for Q3 and covers spam, social engineering, Web threats, cybercrime and malware.  ...More >

IPhone Worms Begin Their Attack on Modified Devices

13 Nov, 2009

It was bound to happen. The first worm has been detected that affects the Apple iPhone. The worm, known as Ikee, really only affects iPhones that are running the Secure Shell utility, where the...More >

Online Security: Free Wi-Fi Isn't Really Free

11 Nov, 2009

Google has announced that it will begin to offer free Wi-Fi to travelers in 47 airports across the country. Google has partnered with Time Warner, Boingo Wireless, Advanced Wireless Group, and others...More >

OMB in Dark About Security Spending

09 Nov, 2009

Maybe it's old age or maybe because the holidays are just around the corner, but I don't want to beat up the White House Office of Management and Budget too badly for not knowing how much it's...More >

Joint Cloud Venture Brings Big Hopes

05 Nov, 2009

Cisco and EMC announced this week that they are collaborating to provide private cloud computing services. The new partnership includes Cisco, EMC, VMware, and Intel, and will develop virtual...More >

University of Penn Deploys DNSSEC: Let's See More Adopters

04 Nov, 2009

Many of you know that I teach in the security and technology program at Drexel University in Philadelphia, Pa. When I heard that the University of Pennsylvania, a competing school in Philadelphia,...More >

Chief Information Security Officer: A New Spin on an Old Job

02 Nov, 2009

In a recent survey of over 7,000 CEOs, CIOs, CFOs, CISOs and CSOs by Price Waterhouse Coopers, 85 percent of respondents said that they now have a security executive, a Chief Information Security...More >

Thoughts on Windows 7

29 Oct, 2009

I wanted to wait until all the hype around Windows 7 died down a bit before sharing my thoughts with you about the recently released OS. I have heard some good things about Windows 7, but then again...More >

Companies Still Making IT Pay Cuts, But Why?

27 Oct, 2009

According to a recent NetworkWorld article that I<strong>T Business Edge blogger Ann All</strong> wrote about, companies are still making IT pay cuts and forcing unpaid furloughs. These...More >

Cookies - a Trick or Treat

26 Oct, 2009

With Halloween right around the corner, I thought I would post something with a scary theme. A cookie tracks where you have been on the Internet. Every time you visit a site, you most likely create a...More >

Don't Forget About The Forgotten Software Policy

22 Oct, 2009

This is the final post in my series on IT security policies. The other two posts examined good e-mail and Internet policies. Today, I look at the software policy, which I call "the forgotten policy"...More >

Companies Need a Good E-mail Policy

21 Oct, 2009

In my first post this week, I covered what a good Internet policy should look like. In this post, I plan to cover an e-mail policy. This policy has evolved quite a bit throughout the years. I don't...More >

Don't Forget to Create Good Security Policies

19 Oct, 2009

I am working on a presentation about IT security policies, in which I will cover three policy areas: Internet, e-mail and software usage. There is way too much material overall to cover in one post,...More >

Linux Live CD Boots up a Way to Avoid Malware

15 Oct, 2009

I found a great idea about avoiding malware that I just had to share with you. After I read it, I said to myself, "duh." We all know that much of the malware written today targets the Windows...More >

Which Data Is Important?

15 Oct, 2009

A TechCrunch column published in the Washington Post just got under my skin. It takes off from the recent events involving Danger, a Microsoft subsidiary that provides mobile operators with...More >

Security Strategy Survey's Key Findings Positive

13 Oct, 2009

Dimension Data, an IT services and solution provider, working with IDC, commissioned a report titled, "2009 Global IT Security Research Results Summary," whose findings look positive for all industry...More >

Military Says Its Cloud Beats Google's Best

08 Oct, 2009

The government is telling Google that its cloud is superior. The Defense Information Systems Agency (DISA) has recently announced that its cloud network, code named RACE - Rapid Access Computing...More >

IT Needs to Get Control over IPhone Security

06 Oct, 2009

Apple announced recently that it reached a new record. Users have downloaded two billion applications from the Apple App Store. A half-billion applications were downloaded this quarter alone. The...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data