SmartAdvice: The New Face Of Project Management
From collaborative software to alert management, business collaboration has taken on new looks, The Advisory Council says. Also, your company's size and market dictate whether a modular or integrated retail order-management system is best.
The Clueless CIO
We recently ran a poll to determine how "in the loop" the CIO is about Web services development efforts. We chose to ask about Web services because that's where SOA efforts usually start: at the grass roots of the organization, used to solve sticky integration issues that can't easily be solved by more traditional methods.
Getting Anything Out Of Gmail?
I wrote about the competition between Google and Microsoft in my email newsletter this week. (You can read the piece here, but how lame is that? You should be subcribing to it.) I mentioned that because Google didn't sell software it didn't have to lock in its customers with proprietary formats and non-standard protocols the way Microsoft does.
One of my readers, Malcolm M
Understanding Customers' Many Tongues
Suppose you're a multi-billion dollar distributor with millions of parts in your catalog, but your customers send in quote requests in myriad formats, including XML files, spreadsheets, delimited lists and Word files. That's exactly the situation at electronics giant Avenet, which is using something called "semantics integration" to intelligently decipher the abstract communication coming from its buyers.
Bad News: Cyber Crimefighters Are Losing The Battle
While sitting in the Knuckles Sports Bar at the Hyatt Regency Resort in Monterey, Calif., watching a jovial group of high-tech crime-fighting experts exchange work-related yarns and engage in the ageless Yankees versus Red Sox debate, a confident feeling came over me. No way were the cyber bad guys gonna get to me here.
Trump To Outsourcing Critics: You're Fired!
The latest voice to argue that offshore outsourcing boosts economic prosperity in the U.S. comes from Mr. Apprentice himself, Donald Trump. In his blog on the Trump University Web site, Trump cites studies that show that using low-cost, foreign labor ultimately makes U.S. companies more profitable and competitive, creating a cycle whereby they ultimately are able to add more higher-paying, higher-value jobs domestically.
Distributed Management Revisited
Few have accused systems management vendors of making revolutionary technology innovations. However, in an industry where incremental technology advances really do add up, there are clear signs that genuine progress is being made toward dramatically reducing support costs and freeing up IT for more strategic pursuits.
Slogging: Blogging With A Vengeance
San Francisco Chronicle columnist David Lazarus noted last week that ZabaSearch.com, a search engine for personal information both sensitive and mundane, plans this Thursday to roll out a blogging service. ZabaBlog, Lazarus wrote, "allows people -- former classmates, ex-lovers, disgruntled co-workers -- to discuss you online."
Call it "sloggin
Katrina Makes Life Difficult In The Big Easy
Perhaps there isn't a meaningful business technology parallel to the hellacious scenario that unfolded Monday in New Orleans, although I did once attend a Common AS/400 user conference at the newly convertible Superdome. As Hurricane Katrina unleashed her fury along the city's cobblestone streets and left several residents stranded on their rooftops, people were more co
The Great Ease-Of-Use Barrier
Everybody in the business intelligence field knows how data quality problems can scuttle even the simplest BI deployments. But a recent study points to an even bigger challenge plaguing the adoption of business intelligence tools: ease-of-use.
A survey from our sister publication InformationWeek found that ease-of-use issues now comprise the single biggest barrier to BI projects, according to 300 study respondents who work in business intelligence. Employees' struggles with BI tools pose greate
IT Confidential: The Evidence Is Out There--E-Mail, Etc.
Startup develops automated E-mail analyzer ... security breach exposes Air Force officers' personal information ... "men's entertainment" magazine enters intellectual-property fray ... World Trade Organization seeks to pin down U.S. stance on online gambling.
IT At The Eye Of The Storm
Hurricane season is again in full swing. Katrina, presently pounding Florida, is being blamed for at least five deaths and cutting power to more than 2 million people in the southeastern part of the state. As devastating as this year has been -- four named storms in the Atlantic so far -- it doesn't yet measure up to the 2004 storm season, during which nine named storms tormented citizens in the Southeastern states. While it's hard to find a silver lining in these storm clouds, at least last yea
Google Talk -- Just Say No
Google has officially announced that it's in the IM business. Hooray? Some months ago the company put out its e-mail effort, GMail. Hooray, I suppose. It's popular among a few GoogleManiacs, but it's really crappy as e-mail systems go. Hell, you can't even delete a message, a feature about as smart as the original Pascal programming language that couldn't display results or take input. If Google Talk is as good as GMail everyone -- especially AOL, MSN, and Yahoo!-- should just ignore it.
Why Wireless Laundry Is Important
Sure, civilization would move forward without Internet-enabled washing machines and dryers, but these devices do make sense and they point to a far more important trend.
Perhaps I'm repeating myself, but this is important: Ubiquitous access to all information is changing the world dramatically. The emphasis here is on the words "all information." Sure, it might seem unnecessary to get an e-mail or text message when your clothes are dr
Business Technology: Security Tips That Will Scare--And Help--You
Security nightmares are swirling all around us--more sophisticated, more malicious, more damaging--and perhaps the next theater in the battle will be industrial networks: energy generation, power transmission, utilities, transportation, telecom, etc. Feel overwhelmed? A great place to start looking for ideas, Bob Evans says, could be InfraGard.
'Tis The Season For Not So Unusual Pairings
Yes, we've reached that phase in the market cycle for compliance-related products and services where the vendors start climbing in bed with each other. And that's a good thing. No, really!
We've known all along that the ability to set and enforce data use policies across an enterprise, on records and documents and even idle chit-chat, spanning everything spreadsheets to instant messages, well. . .that was going to take a lot of vendors working together or some heavy lifting by internal develop
No (DRM) Code For Pearl Jam
When Pearl Jam hits the stage for its upcoming 2005 U.S. and Canadian tour, fans will be able to download music from the live shows within hours of the final encore (probably before most of the band's faithful can get their cars out of the arena parking lot after the show). True to its fiercely independent approach to both music and the recording industry, the band will make its work available online without the protection of any digital-rights-management software. This time, however, it's not j
I Owe Adobe Half an Apology
We just turned comments on for the Pipelines blogs, and it didn't take you long to find them. I was delighted to see so many responses to my post on Adobe sneaking applications onto my PC when I updated the Adobe Reader. (See Bad Behavior, Adobe.) But I was puzzled by comments that said they hadn't had the same problem I did. So I went back to the Adobe site to see what I'd missed.
Stopping The Scourge Requires Internet Citizenship
In her column, MailFrontier CEO Anne Bonaparte calls on Internet messaging industry leaders to drop their ego-centric agendas and cooperate in the war against spam, viruses and phishing, by implementing both Sender ID and DKIM authentication systems, as well as some sort of sender accreditation system on a cooperative basis. I'd take it a step further and call on everyone to also work with the ISPs to help them throttle the attacks s
User-Created Content: The Next Big Thing That's Already Here
You want to know where the big money is coming from on the Internet nowadays? Look in the mirror. Online businesses are increasingly finding revenue in capturing content from users like you. Companies are making money by providing tools and services that let you write stuff, take pictures, organize your information, and publish it to the Web.
Readers Sound Off On Linux
Though more and more packaged BI vendors have announced support for Linux in their reporting tools this year, readers of Business Intelligence Pipeline say they still see databases as Linux's sweet spot in the BI world.
Impetus To Move To SOA Coming From IT Community
What's driving the move to service-oriented architectures (SOAs)? According to Sandra Rogers, program director for SOA, Web services, and integration research at IDC, the good news is that most of it is coming from the IT rather than the vendor community. Compliance is a huge issue, as are new regulations that require process tracking and auditing. There's also a heightened urgency to get control of end-to-end business processes. And then there's the promise of speedy deployment, and the high de
Bad Behavior, Adobe
I try to practice what I preach and do a good deed, and what do I get for it? Abuse.
I just sent out my weekly e-mail newsletter. In the Editor's Note I urge readers to follow Adobe's request and patch their Adobe Reader because of a potential security problem. Things are getting pretty bad when the bad guys pervert familiar, trusted applications like the Reader to be delivery systems for malware. Poor Adobe, I thought, at least it's m
Dancing With An Elephant (Named Google)
Keyword stuffing and search engine spamming are two common techniques that some people and companies attempt to gain higher Google ranking than their sites can achieve on merit and quality.
Failure To Protect?
Last week was just the latest in a string of nightmare runs for system administrators battling malicious code that infringes on their networks via viruses. With no less than three major worms hitting enterprises (link â€œno less than three major worms hitting enterprisesâ€ to: http://www.SystemsManagementPipeline.com/showArticle.jhtml?articleId=169500009) during the course of the week, systems administrators were caught up in a fierce battle against the viruses. And
Details On Sirius Radio 'TiVo' Leaked
A marketing product sheet on an upcoming product called the Sirius Starmate Replay reveals that the gadget offers the TiVo-like ability to "timeshift," recording up to 44 minutes of Sirius satellite radio content. The $129 product will also let you plug in your favorite sports teams, and it will alert you when one of their games is on the radio.
Very cool! Check out the leaked marketing materials here. (vi
Top 10 Mobile Device Privacy Policies
People are storing more types of confidential information on mobile computing devices, and an expert in the field tells you how to keep it all under wraps.
A Warning About Google's New Desktop Search
If you're interested in downloading the new Google Desktop Search beta, please read this before downloading it.
Unlike most Windows applications, which ask permission to close running applications or tell you to go close them, Google's Desktop Search application simply shuts everything down on your desktop without permission or warning. Open browser windows, Outlook -- whatever -- just gone without a trace. So make sure you save a
Hot Apps: GhostSurf 2005
You want to stay anonymous on the Web? This will make you invisible. GhostSurf does anonymizing in an easy-to-use package and its Platinum edition adds antispyware features.