
freshidea - Fotolia
When IT Meets Politics
Discussing the intersection between politics and the information society.
November 2010
-
.uk is not .com - let alone .anon or .xxx
- Winsafe Ltd 28 Nov 2010 -
No taxation without services: can the final third also drop out of Income Tax?
- Winsafe Ltd 24 Nov 2010 -
The ten/twelve scams of Christmas - 2010
- Winsafe Ltd 23 Nov 2010
Would I trust the anonymity/probity/security of a truly off-shore operation, headquartered in Switzerland with its server farms in Norwegian Fjords and Tropical Lagoons ... I wonder
The competiton should be open to others besides Royal Mail because the cost of cross-subsidising one-stop-shop services in rural areas and deprived communities, let alone serving the sick and ...
The first sign of a reputable supplier is that they give a physical address and phone number. Interestingly that is a legal requirement under the European Union e-Commerce Directive. Those who do ...
-
Why are our systems so vulnerable: the cybersecurity bandwagon
- Winsafe Ltd 22 Nov 2010 -
What really happens when IT meets politics
- Winsafe Ltd 21 Nov 2010 -
Does centralised ICT procurement give better value?
- Winsafe Ltd 19 Nov 2010 -
Why consumers give up on cybersecurity
- Winsafe Ltd 06 Nov 2010 -
Cybersecurity in Cloud Cuckoo Land
- Winsafe Ltd 01 Nov 2010
Is the real reason for the focus on information assurance rather than vulnerability or predator removal it would put at risk the multi-billion pound cybersecurity sticking plaster industry?
So you want to get a PhD in political science helps bring out the difference between ICT nerds and policy wonks. Reminded me of the description of a modern degree in Electrical Engineering "wall to ...
I gained a great respect for the prejudices of the pre-Armstrong Civil Service.
On Monday I will suggest that "staff who can produce, maintain and support intelligible and accurate user interface and help facilities" are the most critical cybersecurity skills shortage. Later ...
Those collating information to impersonate us have already far more "leaked" files of personal information, let alone computing power, available to them than did the allied World War 2 teams at ...