Opinion: Learning From SCO's Mistakes
SCO's self-destructive streak, says Rob Enderle, is an extreme example of the damage denial, arrogance, and wishful thinking can inflict on a company. It's a lesson, he says, that a lot of other firms, including some of SCO's most bitter foes, would do well to take to heart.
Animated Map Of Coalition Deaths Helps Site Visitors Visualize Casualties Of War
Sadly, for many Americans, each death of U.S. soldiers in Iraq is nothing more than a statistic buried on the inside page of the daily newspaper. But an animated map of Iraq helps visitors to a Web site visualize the mounting toll, a small but important reminder of the reality of a war half a world away. The site is further evidence on how the Web puts an individual on the same level as major news organizations in reaching the publ
Software (In) Security
"Danger, Will Robinson! Danger!" That ought to be the first thing every user hears upon breaking the seal on a new application or hitting the "download now" button. Given the rate at which new apps and operating system updates are being cracked, hacked, and infested, perhaps the software industry should adopt as its mascot, the zealously protective, but often useless Robot from the mid-'60s sci-fi classic series, "Lost In S
Unwary Users Make Firefox Easy Prey
Installing the wrong extension could turn Firefox into a sitting duck. For security experts, version control -- and a watchful eye over whyat's on users' systems -- are just as important here as anyplace else.
Web Services Insecurity
Back in 2002, only 5% of businesses had finished Web-services projects, according to IDC. But over the next couple of years, most organizations will have deployed Web services in one form or another, and the overall market should be worth a whopping $21 billion by 2007.
Jason Smathers: Internet Criminal
Let's think about this a second. Our good friend Jason Smathers sold 92 million America Online e-mail addresses to a spammer for $28,000. Those names generated an estimated 7 billion spam e-mail messages so far, and caused at least $400,000 in damages to AOL. And for that, the judge sentenced him to one year and three months in jail, and a payment of $82,000 in restitution to AOL (see AOL Worker Who Stole E-Mail List Sentenced)
Per-Core Software Pricing For The Desktop?
Right now it's just a Big IT story, all about more powerful servers and complicated software licensing agreements, but sooner or later -- probably sooner -- it will come down to the desktop and affect the way you pay for software: Multi-core processors will mean you'll pay a per-core price for the applications you run.
I'm Sticking With Travelocity Because Of Its Lousy Customer Service
The offshoring of IT work to India is now mainstream, and the quality level of completed work is generally good, if not excellent. However, the same can't be said for offshore call centers, where language and cultural barriers often lead to frustrating customer experiences. Yet the practice will continue to grow--and here's one example of why.
Ars Technica posted a news item late last week that made me wonder if April 1 somehow came around twice this year. The U.S. Copyright Office wants to build a new Web site that, according to a notice posted August 1, may work only with Internet Explorer.
The Planning Begins For Windows Vista
Now that Microsoft has released its Windows Vista operating system for beta testing, we decided to ask people when their companies will begin to deploy the finished product. One key finding: Only one in five respondents say they'll begin implementing the operating system within 12 months of general availability.
The Microsoft iPod? Give Me a Break
Microsoft's claim that it invented the iPod would be really funny if it weren't so sad. In fact, it is exactly what is wrong with issuing patents for high-tech ideas: Microsoft, a company that did absolutely zero to put an iPod in your pocket, is getting set to try to grab the profits from the company that actually made the effort, Apple.
BPM Beyond IT
Everyone defines categories of technology differently -- from vendors and analysts to journalists and users. Here at Business Intelligence Pipeline, we consider business process management (BPM), if not a subset of BI, then at least a very close cousin. The automation of business processes inherently involves data aggregation, analysis and reporting. That's the reason we bring tips and news on BPM along with more traditional analysis, data warehousing and the like.
My note to you this week focu
What The Polls Say We're Doing On Online
A few weeks ago, we asked for your input on whether we should change the delivery timing of this newsletter. Over 1,000 of you were good enough to respond (1,043), and as promised - here are the results:
Same time as now: 4 a.m. Eastern time-- 66% .
Noon Eastern time is OK-- 18%.
Don't care-- 16%.
The Great Desktop Linux Controversy
There still doesn't seem to be a consensus regarding the validity of Linux as a desktop operating system. The head of IBM's software business used LinuxWorld as an opportunity to promote the promise of desktop Linux. Then again, IBM isn't the biggest fan of Microsoft. Meanwhile, a Gartner study spelled out that desktop Linux adoption is way behind where it should be at this point, or at least behind where Gartner thought it would be at this point. Here's the deal ...
In Case You've Been In Outer Space, LinuxWorld Was This Week
Another LinuxWorld show has come to pass. It's been a long time since LinuxWorld was dominated by technical folk who used it as a forum for exchanging ideas and an opportunity to attach a face with a screen identity. LinuxWorld is now about how open-source can be "sold" to address the overarching issues facing IT managers today: boosting security and cutting costs. The IT world's biggest vendors were once again out in full force, this time linking arms in a show of unity and trying to convince t
You might think that Individualized Lifecycle Marketing, phishing and other fraud schemes, and a court case that allowed the University of Texas to block unsolicited marketing messages from entering the campus e-mail system, make for strange bedfellows, but you shouldn't. They're connected by a broad, sticky cord of despicable human beings ranging in class from pranksters all the way down to gangsters. Whatever they are, they're slime and nothing more -- all of them!
Blogging About Work? Play Nice
There's a tsunami building, fed by a combustible mix of incredibly stupid (and apparently mean-spirited) workers, public blogs, and nervous companies.
I'm referring to the growing numbers of folks fired or reprimanded in the workplace for either exposing company plans or posting negative comments about co-workers in public blogs.
The latest example comes from the Southern California branch of AAA, which last week fired 27 workers over their postings on the MySpace social-networking Web site, a
SmartAdvice: Agile Programming Not For The Risk Averse
Once an architectural framework has been set, agile programming can give a quick turnaround on specific modules, The Advisory Council says. Also, built-in code tests or unit tests remain the best way to get quality apps.
The Transmigration Of Your PC's Soul
We reported back in July on FingerGear's $149 Computer-On-a-Stick, which is a USB 2.0 flash drive complete with a bootable onboard Linux operating system and open source office suite.
While that's shipping now, IBM researchers are working on another solution called the SoulPad designed to do something similar. The Sou