Feeds

Obama tries to stay connected

Will the White House entertain a BlackBerry?

Boost IT visibility and business value

Barack Obama is hoping to find a way around the rules that ban communications equipment in the White House so he can keep his beloved BlackBerry when he takes office.

In an interview with Barbara Walters on ABC the president elect explained that he is "in the process of negotiating with the secret service, with lawyers [and] with white-house staff" to get information from "outside the 10 or 12 people who surround my office."

Whether that means a blackberry or laptop will depend on those negotiations.

The President isn't usually allowed a mobile phone, as such devices can be tracked and that's considered a security risk.

There is also the question of accountability - detailed records of all presidential communications are essential if we're going to enjoy the voice of future presidents explaining to a tailor that their balls don't fit in their trousers - as this marvellous clip of Lyndon Johnson demonstrates.

Obama says he wants to "keep [his] finger on the pulse of the struggles that people are going through every day", though we're not convinced that the internet is the right place to look for the struggles of ordinary people. But it's nice to know that the president has something in common with the convicts in American prisons, who are equally restricted in their communications. ®

The essential guide to IT transformation

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.