John Dickinson - Authors & Columnists - InformationWeek
IoT
IoT
Author
 John Dickinson

Profile of John Dickinson

News & Commentary Posts: 27
Articles by John Dickinson

Jabber Ships IM Appliance

9/5/2005
JabberNow aims for smaller firms, enterprise workgroups with an IM product that combines carrier-grade messaging features with wide-ranging interoperability and federated network support.

Post a Comment

Sender ID: It Could Get Ugly

6/26/2005
It could get a little ugly out there in the anti-spam world and, as is so often the case, the uglifier of record is Microsoft which on Thursday announced that it would start "enforcing" the use of its Sender ID sender authentication protocol for senders of e-mail messages to Hotmail and MSN Mail systems. In a less avaricious world, that might be a good thing, but last year Microsoft made its desire to co-opt sender authentication by enforcing a patent it has on a part of the way DNS records have

Post a Comment

Presence Will Be Very Present Here

6/19/2005
Presence information is important to the future of messaging technology and how we use it, so important that I've devoted a lot of space to its emergence as a technology this year at Messaging Pipeline. Only a few products outside of traditional and enterprise instant messaging systems integrate presence information or otherwise take advantage of presence technology, but you can be that more will during the next 18 months, and there's a reason: Presence information makes digital and analog messa

Post a Comment

Getting Less Spam Lately?

5/3/2005
You may have noticed that it's become a little quiet in the world of anti-spam technology these days. Sure, Mirapoint Commtouch, and Borderware all announced new releases of their already proven products this week, but those upgrades are not much more than "point" releases that provide incremental services to existing customers. Good services, mind you, but nothing that represents a new breakthrough in the war against spam. I don't think that's because it's still early spring or because W. is st

Post a Comment

Be Careful! Your E-Mail Past May Catch Up With You

4/26/2005
The Internet Era has, in just a few short years, seen e-mail go from a newly-minted, often-talked-about-in-excitedly-hushed-tones, messaging technology to the most pedestrian sort of communications systems, more mundane than even the lowly wired telephone on your desk. But as we all know, mundane doesn't mean unimportant, and it's become something of a scourge among the ill-behaved and the criminally minded folks who have used it from time to time to express ill will, outrage, or just plain crim

Post a Comment
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll