Questions for the Upcoming Big Data Security Tweet Jam on Jan. 22

Last week, we announced our upcoming tweet jam on Tuesday, January 22 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the impact of Big Data on security and how it will change the security landscape. The discussion will be guided by these six questions… Continue reading

Big Data Security Tweet Jam

Please join us on Tuesday, January 22 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. GMT for a tweet jam, moderated by Dana Gardner (@Dana_Gardner), ZDNet – Briefings Direct, that will discuss and debate the issues around big data security. Key areas that will be addressed during the discussion include: data security, privacy, compliance, security ethics and, of course, Big Data. Continue reading

2013 Open Group Predictions, Vol. 2

Continuing on the theme of predictions, here are a few more, which focus on global IT trends, business architecture, OTTF and Open Group events in 2013. Continue reading

#ogChat Summary – 2013 Security Priorities

Totaling 446 tweets, yesterday’s 2013 Security Priorities Tweet Jam (#ogChat) saw a lively discussion on the future of security in 2013 and became our most successful tweet jam to date. In case you missed the conversation, here’s a recap of yesterday’s #ogChat! Continue reading

Questions for the Upcoming 2013 Security Priorities Tweet Jam – Dec. 11

Last week, we announced our upcoming tweet jam on Tuesday, December 11 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the topic of IT security and what is in store for 2013. The discussion will be moderated by Elinor Mills, former CNET security reporter, and our panel of experts will include… Continue reading

2013 Security Priorities – Tweet Jam

2012 was a big year for security. Congress debated cybersecurity legislation ; social networking site LinkedIn was faulted for one of the largest security breaches in history; and global cyber espionage was a trending topic. On Tuesday, December 11, The Open Group will host a tweet jam examining the topic of IT security and what is in store for 2013. Continue reading

The Tagging Trap

Hashtags work. At least on Twitter. People sacrifice precious characters to tag their tweets. Why they work?  They are emergent*. Nobody owns them. And they have the fate they deserve. A tagged micro-post becomes immediately a member of the set of all micro-posts having this tag. The main function is to direct the tweets to […]

#ogChat Summary – The Future of BYOD

With over 400 tweets flying back and forth, last week’s BYOD Tweet Jam (#ogChat) saw a fast-paced, lively discussion on the future of the BYOD trend and its implications in the enterprise. In case you missed the conversation, here’s a recap of last w…