• July 31, 2008 31 Jul'08

    Where do we spend the money?

    I was involved in a debate today where three opposing views were being taken with regards to implementing a hypothetical new online application. Given a limited budget, should most of the money be ...  Continue Reading

  • July 31, 2008 31 Jul'08

    Unlock the secrets of the numerical pyramid

    In this diagram, contributed by Chelmsford reader Ivor Smith, the original pyramid has been built up by adding together the two integers in each pair of...  Continue Reading

  • July 31, 2008 31 Jul'08

    NAS virtualization explained

    NAS virtualization can refer to the ability to virtualise multiple NAS heads into a single virtualised file system or the ability to spawn multiple virtual file servers within a physical file server. Either way, performing NAS virtualisation via a ...  Continue Reading




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...