Can Security Awareness Deliver Competitive Advantage?
It's disconcerting to live in a world where security can be seen as delivering competitive advantage, yet that's the idea behind Unisys's Enterprise Security initiative. But after all, the company's Trusted Enterprise Model only extends the security selling point that is a marketing mainstay for financial institutions and that has been adopted or embraced by IT vendors, sometimes far too slowly, with the rise of network computing.
SMB Outlook Good For Tech Spending
High priority expenditures include secured data backup, storage, disaster recovery, IP telephony, virtualization, and consolidation, according to a new CompTIA survey.
Silicon Valley Crash Course: 14 Startups In 28 Hours
I just returned from a trip to earthquake land where I had one-on-one meetings with 14 tech startups in just over a day. Their products included a project-management app, e-mail marketing tool, widget maker, and PC database. The big unanswered question: Who needs them?
The Zune Universe Expands, Where's The Bling?
If Microsoft wants to even catch a sliver of iPod's market share, it's going to have to build up its base of third-party accessories for its Zune music player... Oh, wait. That's just what they did this week.
Is The Web Headed For Meltdown 2.0?
In recent months I've seen a lot of anxiety in the tech marketplace. Bloggers, pundits, and industry insiders all seem to suggest that Web 2.0 is headed for Correction 2.0. Are we in the middle of another bubble?
Is Apple's Leopard Worth the Leap?
Apple is making headway in the enterprise environment. But is Leopard, the sixth major release of Apple's Mac OS X operating system, worth an IT manager's consideration?
Good Rules Can Eliminate 65% of Activities
There's a long list of verbs - adjust, approve, expedite, inspect, verify and many others - that tend to indicate that activities are non value-added and should be considered for elimination. Many of these exist because something wasn't done right the first time, and a lot of the the non-value-added activities can be cut if there are ways to reduce the error rates in the real-value-added and business-value-added activities.
The Three Opens, Pt. 1: Open-Source OS
There's been a lot of talk about the three big "open"s in the computing world today -- open-source OSes, open-source applications, and open standards. I'm going to talk about each one of these things in turn over the course of the next few blog posts, and examine how they fit together and complement each other.
What Does Web Analytics Consolidation Mean to You?
There has been plenty of discussion over the last few days about "consolidation" in the Web analytics marketplace due to the Omniture/Visual Sciences deal... In fact, the marketplace is not consolidating; it is in fact fragmenting, and there are plenty of options to consider if you are purchasing Web analytics solutions... Much of the consolidation discussion is based on vendors that adhere to the SaaS/page-tag collection model.
Shovels As A Service In The Social Networking Gold Rush
For this week's feature on Web 2.0 in the enterprise, we counted
17 startups that offer social networking platforms. I don't mean
social networking sites (there are thousands of those), but
companies touting technology for the FaceBook and MySpace wannabes.
Been There, Done That: Q&A With SAS's Jim Goodnight
Doctor Jim Goodnight has led SAS since the company incorporated in 1976. Laconic and unflappable yet fiercely competitive, Goodnight has presided over a company that has long reigned atop the analytics market. We caught up with him in New York last week and discussed the changing BI market and the future of SAS.
BI as Commodity Technology: The Information Angle
BI is complex, simultaneously software, transformational work practices, and business information. Consider: What value is reporting or OLAP or data mining (software) that doesn't tap whatever data is relevant to produce business insights (information) that can help you restructure, realign, or optimize business operations (practices)? We need to examine all three, complementary aspects of business intelligence: software, information, and practices. Let's start with information, with BI sou
Startup Makes Bold Spam-Fighting Claims
Abaca, a startup that launched at last week's Interop NY show, claims to have developed a new approach to spam filtering that guarantees a minimum of 99 percent accuracy.
Microsoft Wants to Stick XP on XOs
Like an uninvited birthday party guest who shows up on the wrong date with an unwanted gift, Microsoft is "working to adapt a basic version of Windows XP so it is compatible with the non-profit One Laptop per Child Foundation's small green- and-white XO laptop."
Should You Replace Microsoft Office with an Online App?
What feels like the sudden arrival of a multitude of online app options -- like Google or Zoho -- has allowed IT managers to ponder a move they would never have even considered just a short while ago: Replace Microsoft Office with an online office suite.
|