Commentary - Content posted in June 2005 - InformationWeek
Content posted in June 2005
<<   <   Page 2 / 2
Business Technology: Implementing RFID Is A Risk Worth Taking
Commentary  |  6/10/2005  | 
With all the talk about RFID, what's the real story? Is there hope or is it all just hype, Bob Evans asks, as he looks at specific examples and advises that while there's risk in jumping in, there's probably a whole lot more risk in standing pat.
SmartAdvice: Standardize Backup-And-Restore Storage
Commentary  |  6/10/2005  | 
Deploy backup tasks to underused resources for best efficiency in an enterprise backup system, The Advisory Council says. Also, there's a high threshold for moving PowerBuilder developers to Java.
What We Can Learn From Korea
Commentary  |  6/10/2005  | 
The Seoul school authority is handing out leaflets to students on mobile phone use and etiquette. Meanwhile, American public schools are living in the past.
Trendspotting: Getting The Most From CRM
Commentary  |  6/9/2005  | 
Define your goals for implementing a CRM system, then choose an integration partner as carefully as you selected a CRM package, follow best-practices tips, and keep a clear eye on meeting measurable goals, Rebecca Wettemann says.
Steve Ballmer Delivers On A Security Promise
Commentary  |  6/9/2005  | 
When Microsoft CEO Steve Ballmer disclosed this week that several new tools for software patch management are now available, he was delivering on a two-year-old promise to relieve one of the most acute pain points for many IT departments.
BI Jobs On The Rise
Commentary  |  6/7/2005  | 
More evidence indicates BI hiring is growing on both the user and vendor sides.
More Famous 'Ware
Commentary  |  6/7/2005  | 
The Software Hall of Fame contest underscores something I think is very interesting: the tremendous change the World Wide Web has made in how we use software and what we think is good software. The history of PC software isn't that long. It goes back only about 25 years, to 1980, give or take a couple of years. For the first 15 of those years, software was productivity-oriented and kinda geeky: the big hits were
RFID To The Rescue
Commentary  |  6/7/2005  | 
If ever there was an industry that has boomed thanks to globalization, it's shipping, logistics, and transportation. Overseas shipping now accounts for more than 90% of worldwide trade, with 95% of all U.S. cargo passing through the nation's 361 ports, according to a new report from A.T. Kearney. But navigating the "tangle of containers, ports, carriers, customs, and security checkpoints" is a tough nut to crack. Can RFID meet the challenge?
Outsourcing And The End Of Emerging Markets
Commentary  |  6/7/2005  | 
If American IT workers are having a tough time competing against their Indian counterparts, what's going to happen when emerging, even-lower-wage countries like Vietnam get into the offshoring game? The answer, in fact, bodes well for U.S. technologists.
FBI IT: Lessons To Live By
Commentary  |  6/7/2005  | 
After more than three months chasing this week's cover story on the FBI's IT woes, I read with great interest a similar account in yesterday's Washington Post. The main difference between our stories is the Post's ability to get their hands on a confidential report to the House Appropriat
Microsoft Tries to Skew Younger
Commentary  |  6/7/2005  | 
In a world of iPods and Google, can Microsoft reclaim a quotient of cool for itself? What Microsoft's gained in market share and wealth since the launch of Windows 95 it's arguably lost in the less tangible category of buzz. Apple Computer and Google have it, and Microsoft wants some of it back.
Opinion: Browser Swapping Is Not A Long-Term Fix
Commentary  |  6/4/2005  | 
Switching browsers might protect you against software security problems for now, says Mike Fratto, but in the long run it's a strategy that's destined to fail.
Letters To The Editor
Commentary  |  6/3/2005  | 
Data Dredging, Rule For Disposal, Dot XXX
Commentary  |  6/3/2005  | 
The rule is meant to stop identity thieves from 'Dumpster diving.'
Open Source Processes Infiltrate VeriSign Business Model
Commentary  |  6/3/2005  | 
The open-source mindset is taking firm hold within business environments, even when companies aren't developing open-source software. A terrific example of this is the application development work VeriSign Inc. is doing using VA Software Corp.'s SourceForge Enterprise Edition to integrate a distributed group of software developers. In addition to helping a business unit within the company, which provides a variety of digital commerce and communication products and services, better organize its d
The Training Barrier
Commentary  |  6/3/2005  | 
App integration and data quality aren't the most difficult obstacles facing BI deployments, according to a recent poll.
Business Technology: Build Your Company's Receptor Capacity
Commentary  |  6/3/2005  | 
We need to build our capacity to understand new ideas, the co-CEO of Research In Motion says, so we'll be better prepared for a future that's rushing toward us.
SmartAdvice: Voice-Data Convergence Will Benefit Health Care
Commentary  |  6/3/2005  | 
Greater broadband reach into under-served areas and an increase in consumer self-service will make health care more efficient in the coming years, The Advisory Council says. Also, choosing a value-added reseller is almost as hard as choosing a software package -- and perhaps as important.
Langa Letter: How To Ensure Remote-Control Security With XP
Commentary  |  6/2/2005  | 
XP's built-in Remote Desktop, Remote Desktop Web Connection, and Remote Assistance are great tools, Fred Langa says, but only if you carefully manage their security implications.
How Are You With the "R" Word?
Commentary  |  6/2/2005  | 
Our current slate of lead feature stories all deal with the CIO's relationships and changing roles within the broader organization. We all know those relationships have been, how should we say, tested recently.
Mercedes Benz Rolls Out MP3 Wristwatch
Commentary  |  6/1/2005  | 
Car maker Mercedes Benz has unveiled a branded MP3 wristwatch with a storage capacity of 512 MB.
<<   <   Page 2 / 2

How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll