Antivirus Tools: Clam AV Is The Best -- But Where Are The Rest?
A major app service provider discovers that a well-known, open-source anti-virus tool beats the pants off its commmercial competition. And while it proves just good open-source development can get, it also raises some disquieting questions about the state of the security software market.
Opinion: Fixing Firefox -- Getting Ahead By Looking Back
The Mozilla Foundation's success with Firefox doesn't mean that open-souce code is immune to the mistakes proprietary projects make -- especially backward compatibility, which proved once again this week just how elusive it can be.
U.S. Needs India For More Than Just Outsourcing
Today's meeting between President Bush and Indian Prime Minister Manmohan Singh in Washington provides an opportunity for a big picture look at India's growing importance to America. What's quickly apparent is that efforts to limit the outsourcing of IT work to that country would be damaging to U.S. interests.
Beta-Testing the Marketing?
The first official beta-test version of Microsoft's Longhorn, the next version of Windows, will omit several of the sexier features the company has been honking its horn about for the last six months -- and that throws the spotlight on what is going to be in the beta -- IT features such as user account protection services, simplified corporate image deployment, secure startup for protecting laptops and a Windows System Assessment
Opinion: Sex Isn't The Problem With Grand Theft Auto
Everyone is up in arms about the "Hot Coffee" modification for the game "Grand Theft Auto." The mod adds a sex scene. But does that make the game--where the main character is an urban criminal sociopath running through town, stealing cars, killing cops, beating up innocent bystanders and engaging in gang warfare--suddenly "innappropriate" for children?
Survey: M&A Activity Good For SOA Marketplace
We have the results of two recent polls from SOA Pipeline for you this week. The first was prompted by Sun's snapping up of SeeBeyond to strengthen its SOA hand; we asked if mergers and acquisitions are good or bad for the industry, and you overwhelming said that they were good. A full 70 percent of respondents agreed with the statement that "Mergers and acquisitions are good for the SOA market, they strengthen the resources behind critical technologies." Only 30 percent agreed with the statemen
BPM, Top To Bottom
We cover business process management (BPM) here at Business Intelligence Pipeline because, just like other types of BI, it involves analysis, measurement and reporting of business information. BPM is just a more specific form of BI, if you will -- it involves analyzing process-related data.
This week we bring you two great stories about BPM from our sister publication Network Computing. The first is an in-depth overview of BPM
BPM, Top To Bottom
BPM is just one slice of BI, but it's a critical one with roots that stretch back into the centuries.
Sender ID Is Used By Spammers -- Duhhhhh!
MX Logix says that spammers will be the primary users of e-mail sender authentication schemes, such as SPF and Sender ID. Well, Duhhhhhh! Who ever thought it would be any different? Certainly not I (see Weapons Of Spam Destruction and Depending On Sender ID Is Whistling I
Make Mine Hardcover, Please
Never a fan of science fiction in my voracious book-inhaling youth, I have nonetheless developed a love of sci-fi movies and TV series. I loved The Jetsons as a kid, and more recently, have been an enthusiastic viewer of the entire family of Star Trek spin-offs (TNG, Deep Space Nine, Voyager, and Enterprise),
Should Cell Phones Be Banned In The Car?
I've always been concerned about the safety issues of using a cell phone in the car. Is
there anyone who hasn't been shocked at someone driving badly, only to discover that
person had a cell phone glued to his or her ear? I was therefore happy
Spyware, A Thorn In My Side
Spyware is an onoxious form of marketing, if nothing else. So what are the big guys going to do about it? And just what is Microsoft's role with Claria?
SmartAdvice: ERP Systems Move To Professional Services
Match ERP tools with your business strategy and chose an industry-tailored system, The Advisory Council says. Also, align network-support staffing levels first with network-management processes and network-planning and -architecture processes, then with technical specialties.
The Wedding's Off
The Web is buzzing this morning with rumors that Microsoft's rumored acquisition of Claria, the Adware Behemoth Formerly Known As Gator, has been deep-sixed by somebody at Microsoft -- probably the first adult who heard about the idea.
I liked Ed Bott's take on it best. He quotes the very apropos Stupid Mantra.
The big question, of course, is what will happen to the classification of Claria in Microsoft's Anti-Spyware app --
Who Podcasts, And Why?
Podcasting is a way to make iPods (even more) commonplace. That's because it opens another demographic up to the iPod: Talk show listeners.
Readers Vote On Open Source BI
Our most recent poll shows that most readers appear interested in open-source business intelligence to one degree or another, but none of the current vendor entries garners clear favor.
Readers Vote On Open Source BI
A recent Biz Intelligence Pipeline poll shows that most readers are curious about open-source BI to one degree or another, but none of the current vendors stand out in this young, fast-growing market niche.
It Takes More Than Ethical People To Make An Ethical Company
OK, let's get serious, no quips about corporate ethics being an oxymoron. We all know that a lot of the recent regulatory fervor was the result of an unethical few engaging in downright illegal activities. And now we're all wearing this compliance monkey on our backs.
Offshore Outsourcing Can Help Win War on Terror
Last week's bombing of London's transportation system shows that the war on terror continues and that ultimate victory requires long term commitment and a long term plan. In addition to military tactics, the strategy needs to include political and economic weapons--like offshore outsourcing.
Forgive me--I, too, have stolen Wi-Fi
With word that someone is being prosecuted for stealing Wi-Fi access, I just can't keep it in any longer. Yes, I feel a confession coming on. Do you have a tale of stolen Wi-Fi you need to get off your chest? Read mine, then share your own tale of misbegotten Wi-Fi access. We'll get through this together.
What Wasn't Said, And What Was
Is Microsoft fiddling its Anti-Spyware product to give a free pass to adware from a company it intends to buy? Microsoft's "clarification" leaves two key points absolutely unclear, but we can draw some conclusions -- one because of what the company didn't say, and one because of what it did say.
The "Response to questions about Claria software" posted on the Microsoft Web site on Friday and addressed to "
Small Biz Blogging Joins The Marketing Mix
More than 40,000 new blogs a day join the millions that are already online, and a small but growing number of these are small businesses looking for new ways to reach potential customers.
Feds Accuse Respected Corporate CEO Of Downloading Kiddie Porn
Bowne & Co. can serve as an example of what companies should do when their CEO, or some other high-powered exec, is charged with using corporate resources to download kiddie porn.
Unfortunately, it's a bad example.
Bowne is a financial printing firm with 18th century roots. According to our story by John Foley, Bowne's former CEO, Robert Johnson, was charged with downloading child pornography. The
SmartAdvice: How To Leverage Business-Intelligence Tools
Companies want to leverage their investments as much as possible, The Advisory Council says, so consider, what are your pain points? Also, how to structure an outsourcing deal so you can cut your losses early if it's not working out.
Fighting Terrorism: IT, Not Bombs
In this space ordinarily reserved for analysis and commentary on IT topics, every now and again, there comes a news event that has such an impact, that it seems inappropriate not to make mention of it regardless of any link or lack thereof to IT. That's because in these cases, what links us as readers and editors to the story is our humanity.
Filtering Out Smut
The Government Accountability Office, in a recent report entitled File Sharing Programs: The Use of Peer-to-Peer Networks to Access Pornography, said Google and Yahoo search engines failed to effectively block pornographic and erotic images. The GAO, the investigative arm of Congress, conducted its tests in February, as we reported last wee
Calling All Web Analysts
Check out our one-stop, comprehensive report card on an entire stable of Web analytics products.
WTO Gets It Right on Offshore Outsourcing
In its annual trade report, issued last week, the World Trade Organization concluded what many advocates of offshore outsourcing have been saying for some time: that offshoring is good for both buyers and sellers of IT and business-process services--and the countries in which they operate.
The iPod Is The New Desktop
As editor of the Desktop Pipeline, I think a lot about -- naturally -- the desktop. And what do I think? That the desktop is splintering.
That's not exactly a deep insight. The so-called "desktop PC" is just as likely to be a laptop these days. The Palm, the Pocket PC, and the Blackberry have all grabbed a piece of the action that used to happen exclusively on the desktop. And now, of course, there's the iPod,
Two Wrongs Don't Make a Right
The United States government took two wrong turns this week in its stewardship of the Internet. Both will have long-term negative impact on the Internet's value here in the United States and around the world, and both could easily have been avoided.
The first was the Supreme Court's regrettable decision in MGM vs. Grokster.
The second, and arguably more serious, misstep was the Bush administration's announcement that it had changed i
Feds And The Internet: If It's Not Broken, They'll Break It
If there's one thing you can count on the federal government getting wrong, it's how to handle the Internet. Last week's announcement that the feds will retain control of the domain system -- at the same time it was holding hearings into IP v6 problems -- prove that in spades.
The Open-Source Open Mic: Reader Email
I always appreciate hearing from Linux Pipeline readers and newsletter subscribers -- if I don't have to call the bomb squad or soak it in water until it stops ticking, then I figure it's worth taking as constructive criticism. And it's certainly worth sharing.