John Dickinson - Authors & Columnists - InformationWeek
 John Dickinson

Profile of John Dickinson

News & Commentary Posts: 27
Articles by John Dickinson

Jabber Ships IM Appliance

JabberNow aims for smaller firms, enterprise workgroups with an IM product that combines carrier-grade messaging features with wide-ranging interoperability and federated network support.

Post a Comment

Sender ID: It Could Get Ugly

It could get a little ugly out there in the anti-spam world and, as is so often the case, the uglifier of record is Microsoft which on Thursday announced that it would start "enforcing" the use of its Sender ID sender authentication protocol for senders of e-mail messages to Hotmail and MSN Mail systems. In a less avaricious world, that might be a good thing, but last year Microsoft made its desire to co-opt sender authentication by enforcing a patent it has on a part of the way DNS records have

Post a Comment

Presence Will Be Very Present Here

Presence information is important to the future of messaging technology and how we use it, so important that I've devoted a lot of space to its emergence as a technology this year at Messaging Pipeline. Only a few products outside of traditional and enterprise instant messaging systems integrate presence information or otherwise take advantage of presence technology, but you can be that more will during the next 18 months, and there's a reason: Presence information makes digital and analog messa

Post a Comment

Getting Less Spam Lately?

You may have noticed that it's become a little quiet in the world of anti-spam technology these days. Sure, Mirapoint Commtouch, and Borderware all announced new releases of their already proven products this week, but those upgrades are not much more than "point" releases that provide incremental services to existing customers. Good services, mind you, but nothing that represents a new breakthrough in the war against spam. I don't think that's because it's still early spring or because W. is st

Post a Comment

Be Careful! Your E-Mail Past May Catch Up With You

The Internet Era has, in just a few short years, seen e-mail go from a newly-minted, often-talked-about-in-excitedly-hushed-tones, messaging technology to the most pedestrian sort of communications systems, more mundane than even the lowly wired telephone on your desk. But as we all know, mundane doesn't mean unimportant, and it's become something of a scourge among the ill-behaved and the criminally minded folks who have used it from time to time to express ill will, outrage, or just plain crim

Post a Comment
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll