Commentary
Content posted in February 2005
Page 1 / 2   >   >>
Blogging Simplified
Commentary  |  2/28/2005  | 
Web Crossing, Inc., an enterprise collaboration software company, today introduced SiteCrossing, a hosted Web site service offering blogging and collaboration tools for individuals, as well as small- and medium-sized businesses.
Rob Enderle: Man With A Death Wish
Commentary  |  2/28/2005  | 
Analyst Rob Enderle has been writing a lot of columns recently dissing Linux and open source, but that's not the message I take away from those columns. The message I take away is that you can't solve security problems by installing a product.
SmartAdvice: Telecommuting A Boon With Proper Safeguards And Training
Commentary  |  2/25/2005  | 
Make telecommuting a privilege and focus on training and security for a successful experience, The Advisory Council says. Also, look for range of services and experience from a data-center-relocation services provider.
Letters To The Editor
Commentary  |  2/25/2005  | 
The Spyzilla Project?
(Or, A Modest Proposal...)
Commentary  |  2/25/2005  | 
Microsoft almost pulled a fast one on me today. As usual, those sly foxes love to play the fools, only to turn the tables when you least expect it. I eventually saw through their brilliant subterfuge, but it was a near thing.
The Observer: Adjust Expectations To Maintain Greatness
Commentary  |  2/25/2005  | 
When things are going well is the time to look ahead and plan ahead, says Lou Bertin.
Business Technology: Security, Microsoft, And High-Stakes Poker
Commentary  |  2/25/2005  | 
Microsoft is playing high-stakes poker with its customers over the security of its products and technologies, and so far, Bob Evans says, the company's raises and bluffs have held up. But the other players are getting tired of the game, and Microsoft might find that dominating such a game will be little more than a Pyrrhic victory.
Securing Government IT: Your Tax Dollars Not At Work
Commentary  |  2/25/2005  | 
Securing our federal IT systems and networks is so important that spending tax dollars to educate some 125 federal chief information security officers about the latest in cybersecurity-and to get them to collaborate-seems like a sound investment. That's not the case, however.
RFID, Fast Follower Strategies Don't Mix
Commentary  |  2/25/2005  | 
The most common reaction to RFID in the retail industry appears to be apprehension. That's not a reason to stand still, however. RFID is not a technology that lends itself easily to a "fast follower" strategy, due to heavy infrastructure, as well as business process and application, requirements.
Langa Letter: Getting The Grunge Out Of Your PC
Commentary  |  2/25/2005  | 
Fred Langa cleans the dirtiest PC he can find, and along the way shows you how you can easily tackle yours.
New Technology, New Approach To Design Apps
Commentary  |  2/24/2005  | 
Arch Ventures Partners has made investments in companies producing radio frequency ID tag and grid computing products, but may next put its money in companies developing products that exploit the nascent dual-core and multicore chip.
Ins And Outs Of EII
Commentary  |  2/24/2005  | 
EII diverges from most traditional ETL-oriented data warehousing in that it accesses -- but does not move -- the information that will be examined using analytics tools.
Google Movies
Commentary  |  2/23/2005  | 
Anticipating Oscar. It sounds like the title of some dreadful film; it is in fact an explanation of the timing of Google's latest search enhancement: cinema-centric search.
Blogging for the Ears
Commentary  |  2/23/2005  | 
In researching a story about Apple's new iPods and podcasting that should appear on InformationWeek.com shortly, I spoke with Royal Farros, CEO of MessageCast, Inc. While discussing how podcasting and blogging are related activities, Farros made an interesting observation about bloggers.
Tale Of The Long Tail
Commentary  |  2/23/2005  | 
It's either a revolutionary economic force, or a bunch of horse hooey, or an old idea with new legs.
Samsung Tosses Smart Phone Into Oscar Gift Basket
Commentary  |  2/23/2005  | 
Sprint reportedly plans to add an unreleased Sprint PCS Samsung smart phone to the Oscar gift basket for Academy Award nominees. Details are sketchy, but here's what I've learned about the phone.
Rob Enderle: You Are Your Worst Security Liability
Commentary  |  2/22/2005  | 
While IT managers scramble to buy products to guard against external threats, they're ignoring the enemy within: Their own errors in setting up network security.
Microsoft: The Security Problem And The Solution?
Commentary  |  2/22/2005  | 
As Microsoft takes aim at the anti-virus/anti-spyware business, it's probably worth pointing out yet again: Is this the company you really want to trust to get you out of the virus/spyware mess? After all, it was Microsoft that got you in.
Open Source Walks The High Wire
Commentary  |  2/22/2005  | 
Linspire is pitching its desktop Linux distro to a tough crowd. Is it also courting trouble by bending a cardinal security rule? Or do the old rules no longer make sense in a market where many desktop Linux users are buying their first computer?
Orange Claims Ownership Of The Color Orange?
Commentary  |  2/19/2005  | 
The UK mobile phone giant, Orange, says its competitors should not be allowed to use the color orange in its advertisements. Next thing you know, they'll claim to own the fruit as well.
Letters To The Editor
Commentary  |  2/18/2005  | 
IT Confidential: It's A Small Tech World, After All
Commentary  |  2/18/2005  | 
Lines are blurring in what is I.T. and what is not I.T., Scott says.
Business Technology: RFID: Time To Take A Stand
Commentary  |  2/18/2005  | 
Sensing defeat, the ACLU and other hand-wringers crank up to attempt to squelch RFID initiatives regardless of potential benefits these technologies and related business-process improvements might offer, Bob Evans says.
Just how many open-source licenses do we need?
Commentary  |  2/18/2005  | 
It's a question to which there's no answer … at least not yet. One thing's for sure: there doesn't seem to be any shortage of applications for new licenses. Ironically, the proliferation new open-source licenses, each with different restrictions and guidelines, introduces incompatibilities that could actually put up walls between some really good programs.
SmartAdvice: Spreading IT Knowledge Among Staff Benefits All
Commentary  |  2/18/2005  | 
Staff development of IT knowledge is a win-win for everyone, The Advisory Council says. Also, it's time to evaluate IT structure in light of ongoing Sarbanes-Oxley compliance.
Secret CIO: Password Complexity Puts Security At Risk
Commentary  |  2/17/2005  | 
Even the best system can fail when people have to remember too much
Superspeed Analytics
Commentary  |  2/17/2005  | 
Whatever we decide we can quantify -- and that's a mighty big chunk of the world -- you can pretty much bet we'll eventually decide we also want to analyze.
Reality Takes A Holiday: Buying The Firefox Hype
Commentary  |  2/17/2005  | 
Analyst Rob Enderle says people who should know better are buying the hype around Firefox: an untested, unproven, unsupported product. He says it's better to wait for Netscape's innovative, and largely unexpected, new Web browser release.
Gadgets Don't Kill People. People Kill People.
Commentary  |  2/16/2005  | 
Studies appear to show that mobile phones, sound systems, GPS devices and electronics of all sorts distract drivers and make accidents more likely. The reality is that inattentive, unskillful or unwise drivers cause accidents, not their gadgets.
Lessons Learned From Google Blogger Who Got Fired
Commentary  |  2/16/2005  | 
Two weeks after getting canned, Mark Jen talks about what went wrong and how others can avoid his mistakes.
Firefox And IE: The Enterprise Odd Couple
Commentary  |  2/15/2005  | 
As Firefox wins new fans and Internet Explorer clings to its captive audience, IT managers have to accept that two browsers are better than one.
Linux is Linux, right?
Commentary  |  2/15/2005  | 
This week's LinuxWorld conference has brought with it the obligatory storm of new announcements from the most prominent providers of the Linux operating system: Novell and Red Hat. Both companies are making a serious play to grab desktop operating-system market share from Microsoft. Both have identified security as a major concern among their customers. And both have become chummy with the tech industry's biggest players. If open-source is all about mitigating vendor influence on IT innovation,
Linux' Maturing Message
Commentary  |  2/14/2005  | 
At this week's LinuxWorld Conference and Expo in Boston, look for technology vendors striving to convince IT managers that the real value to running Linux isn't just cost cutting.
The Big Picture: A Business World Without Boundaries
Commentary  |  2/11/2005  | 
Apps and processes must run on a global network of diverse platforms.
Letters To The Editor
Commentary  |  2/11/2005  | 
SmartAdvice: Managing Wireless Risk Part Of Overall Security
Commentary  |  2/10/2005  | 
Manage security for cell phones and PDAs proactively, The Advisory Council says. Also, telecommuting is a benefit to the company and employees when it's managed correctly.
Langa Letter: Curing Laptop Overheating
Commentary  |  2/10/2005  | 
Sometimes, Fred Langa says, fixing a too-hot laptop/notebook computer is as simple as "Whooosh!"
Fast And Furious
Commentary  |  2/10/2005  | 
BI software firms are posting big sales gains, and indications from the user side are that 2005 will bring more of the same.
IBM and SCO Share Split Decision In Latest Linux Sparring
Commentary  |  2/9/2005  | 
The wheels of justice continue to turn slowly in The SCO Group's $5-billion lawsuit against IBM, despite IBM's attempts to speed the process by requesting certain summary judgments that get to the heart of the case. The Utah U.S. District Court judge presiding over the case essentially rendered a split decision between the companies when he ruled Tuesday that he would allow IBM to maintain its claim that it hasn't infringed up
The Root Of MySQL's Security Evil?
Commentary  |  2/8/2005  | 
The recent worm attack that hit thousands of MySQL installations reflects a growing trend in the malware world. This worm doesn't exploit a weakness in the MySQL code--it exploits lazy admins who could protect themselves with one simple step.
Government IT Innovation To Go Commercial
Commentary  |  2/8/2005  | 
Is automated case management the Tang of the 21st century?
Palm Re-Invents The 'Clamshell'
Commentary  |  2/8/2005  | 
A post on the PalmAddict site says palmOne has been granted a patent for a unique smart phone design. Like some existing devices, it's a clamshell form-factor... sort of.
Opinion: Bring On The Zoom-Zoom
Commentary  |  2/8/2005  | 
GlobusWorld starts in earnest today in Boston, allowing grid-computing aficionados to debate the technology. Among them is Mazda, which will report on its grid trial with NEC.
Raising Public Awareness
Commentary  |  2/7/2005  | 
A new campaign aims at reaching out to the public to stop online child pornography.
Page 1 / 2   >   >>


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.