From touch-screen ballots to Internet elections, the idea of voting by computer is becoming less popular thanks to questions about the security of electronic voting systems.
Articles by Joe Stanganelli
What is the Internet of Things? What isn't it? With the help of insights from representatives at the Connected Cloud Summit, Joe Stanganelli explores.
Activists insist on the inherent superiority of open source, despite NSA backdoors, the fall of TrueCrypt, and the Heartbleed and Shellshock bugs.
As IoT took center stage at the Connected Cloud Summit in Boston, so too did discussions on the obstacles in the way of deployment.
More bandwidth! Speedier connections! Greater accessibility! Bigger data faster! These are the demands of tomorrow's IoT. Can they be met? If so, how?
Experts at Boston's Connected Cloud Summit argue that the cloud and the Internet of Things are necessarily intertwined.
Poor patching practices top our list of IT pet peeves, and for good reason. They lead to massive security risks.
End users are guilty of committing several IT pet peeves, but whose fault is that? Let's talk servers in sinks and temps with admin access.
What drives network engineers mad? Let's talk about bad cable management and worse GUIs.
What common mistakes make life harder in the IT trenches? Joe Stanganelli investigates.
Accessibility and cloud security concerns push development of on-premises cloud alternatives for the life sciences and genomics industries.
"Anti-cloud" appliances help the life sciences and genomics overcome compliance, cloud security, and data accessibility concerns.
A common Wi-Fi setting renders smartphones and other wireless devices vulnerable to exploits by specialist drones.
The Careto malware, a.k.a. The Mask, could have been a Duqu-like cyberweapon – but more sophisticated.
After judge declares a mistrial in Juniper/Palo Alto Networks patent trial, Joe Stanganelli examines what happened, and what happens next.
Judge calls patent dispute between Juniper and Palo Alto Networks "a classic battle of the experts."
A little magic comes to the data center on Christmas Eve.
NSA backdoors make you more vulnerable to data breaches and their legal ramifications. Joe Stanganelli discusses liability in the event of a data breach.
The Internet of Things comes with a security downside that can't be ignored.
Has the NSA built a backdoor into your enterprise's networking stack? Learn the dangers and how to protect your enterprise's sensitive data.
A disconnect exists between IT and other offices within the enterprise. Here are some strategies for CIOs to bridge the gap and strengthen IT's position within organizations.
Donating the Xen hypervisor to the Linux Foundation may help Citrix gain ground in the cloud wars.