Tech Pay Approaches All-Time High - InformationWeek
07:59 PM
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Tech Pay Approaches All-Time High

CMP Information Week
InformationWeek Daily - Friday, Oct 26, 2007

Editor's Note

Interop Winners: Desktop Conferencing, Deep Security

It's a purely unscientific and anecdotal perspective, but here are my picks for most interesting and most needed technologies from Interop this week, plus the most startling stat I heard in my New York City travels.

Most interesting technology: Desktop videoconferencing system from Avistar Communications Corp. that can be delivered on a hosted or licensed basis, and integrates with major desktop applications such as IM to include a critical presence element. Want to initiate a video call? Connect with your coworker or partner in IM, and kick things off. The video quality is excellent, and the system integrates with room-based systems for those companies that have a huge investment in old-line VC technology that may be underutilized. Avistar's system makes videoconferences more accessible to a larger number of employees and desktops within a big company. Avistar touts major financial firms as multi-thousand-seat customers. Avistar President Simon Moss estimates Avistar's network and systems will carry 50 million minutes of usage this year and an expectation of 90 million minutes in 2008.

Most desperately needed technology: The list of data loss/data breach incidents grows every week. Now there are claims that the granddaddy of them all, TJX, is twice as large as the company has been reporting, with 94 million affected accounts. Stepping up to the plate with security technology that locks down laptops, mobile phones and more is a company called Mobile Armor that's making inroads into US military and other government agencies. Its products range from a Policy Server to set and enforce security policies, to tools to encrypt files and folders on removable media devices, to software for pre-boot authentication and full disk encryption on laptops. The company has unique insights into the most intensive data protection requirements. Director of technical services Matt Brickey related the story of certain military applications in Iraq where three failed password attempts will result in a laptop's hard drive being erased. Which leads me to the...

Most startling stat I heard: One New York-based financial services firm loses one laptop per day and five smartphones per day in taxicabs, says John Pironti, chief information risk strategist for the consulting firm Getronics. A common outcome: The cab companies sell off the gear after 30 days. How that's for risky business?

Please feel free to add your thoughts on what you think the most interesting and most needed technologies are.

Tom Smith

Quote of The Day

Young people tell you what they are doing, old people what they have done and fools what they wish to do.

Top Stories

Tech Pay Approaches All-Time High
SAP consultants earned $88.07 per hour, Java developers garnered $50.89 in the third quarter, according to the Yoh Index of Technology Wages.

Related Stories:

Tech Wages On The Rise

Hourly Pay For Techies At Highest Level Since 2001

Tech Certifications No Longer Get Biggest Pay Premiums, Says Report

White Paper

Microsoft Earnings Boosted By Windows Vista, Office, Halo

The combined revenue of Microsoft's client, business, and server and tools divisions grew by more than 20%, the company said.

RedSky Debuts 'E911 Anywhere' At Interop

The company said the service works with analog, digital, IP hardphones, softphones, and SIP phones.

SanDisk Accuses 25 Companies Of Patent Infringement

The technology is allegedly found in USB drives, MP3 players, and other flash storage products.

BEA Counters Oracle With $21 Per Share Demand

Oracle previously told BEA it won't be upping the offer and will withdraw by Oct. 28, if the BEA board of directors doesn't allow shareholders to vote on the bid.

Could Europe's New 'Blue Card' Cause Global Tech Talent To Shun U.S.?

The European Union hopes that its proposed blue-card program will provide a more attractive alternative to the U.S. green-card program, which critics say is plagued by backlogs, cumbersome processes, and insufficient quotas.

U.K. Kids Get RFID Chips In School Uniforms

Trevor Darnborough, whose company, Darnbro, filed for a patent on securing RFID tags to clothing, hopes other schools will be interested.

Vonage Vulnerable To Eavesdropping Hackers

Security software engineers with Sipera have found flaws in Vonage's VoIP Motorola Phone Adapter, its Grandstream HandyTone-488, and its Globe7 VoIP Client.

Intel To Pay Transmeta $250 Million To Settle Patent Suit

Transmeta had claimed Intel used its technology in a variety of microprocessor products, including Intel's Pentium III, Pentium 4, Pentium M, Core, and Core 2 product lines.

Apple Launches iPhone Resource Center For Developers

The ADC-sanctioned site includes sections on the latest techniques for Web app design, sample code, reference library, and video discussions with iPhone engineers.

Wireless Alliance Forms To Double WiMax Capability

The Smart Antenna RF Test Alliance looks to promote beamforming, which can increase the power in the direction the signal is to be sent.

Motorola Performance Drops, But Sees Optimism For Fourth Quarter

Despite a 94% year-over-year decline in net income, investors seem to agree with the company's rosy outlook for the end of the year.

Tech Pay Approaches All-Time High

SAP consultants earned $88.07 per hour, Java developers garnered $50.89 in the third quarter, according to the Yoh Index of Technology Wages.

All Our Latest News

On The Go

See InformationWeek's daily breaking news on your mobile device, visit and sign up for daily SMS notifications.

In This Issue

The latest research, polls, and tools

Virtualization At The Desktop?
Examine how more than 250 companies plan to adopt server virtualization technology in this recent InformationWeek Research report, Server Virtualization.

The BI Explosion
Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection, in this recent InformationWeek Research report.

Latest InformationWeek Blog Posts

Sure, Apple's 'Leopard' Is Overhyped -- But Here's Why It Matters Anyway
The Apple community is giving Leopard the lite version of the hype orgy that the iPhone received four months ago. All this for a mere software dot-release. It's easy for a sensible person to dismiss the whole thing as flummery, but in fact there are some meaty new benefits to Leopard that are worth looking forward to.

EU 'Blue Card' For Techies Could Give U.S. A Black Eye
Is the United States locking the door and nailing it shut to foreign tech talent while Europe is getting ready to roll out the red carpet? Some people think so.

'CSI: NY''s Second Life Adventure Was Delightful -- But Not Revolutionary. At Least Not Yet.
CSI: NY's episode in Second Life was a total blast. I went into it with pretty low expectations, and was delighted throughout. It was a heck of a lot of fun -- and it got Second Life right in spirit, even though the SL portrayed on the show was much faster, more stable, and had much better graphics than the real thing.

Photoshop For Linux? Don't Hold Your Breath
There's a few applications that would help make Linux more of a mainstream OS, but don't expect to see them ported to Linux anytime soon.  One of the least discussed in this fashion?  Adobe Photoshop.

Report From Interop: Mobile Instant Messaging Is Here To Stay
There's no hiding from it. Mobile instant messaging is creeping into the enterprise whether IT departments like it or not. Enterprises can embrace it or resist it, but they won't be able to prevent a new generation entering the workforce from using mobile IM and other less traditional collaboration tools.

Opera Ups The Mobile Browser War Ante. Again
The people over at Opera Software can't seem to stop innovating. Their latest contribution to the mobile industry is a service that reflects all your PC-based browser settings -- including bookmarks -- on whatever mobile device you happen to be using.

Mobile Business Expo: Tips For Building Business Mobility Strategies
While everyone talks about mobile strategy plans, it seems we all need help when it comes time how to craft them. In an attempt to help CIOs and IT managers better think about mobility I sat down with Philippe Winthrop, Research Director -- Wireless and Mobility, Aberdeen Group, at Mobile Business Expo to come up with some useful tips for this special edition of Take 5.

Green Data Centers Equal A Greener Bottom Line
Think building an eco-friendly data center is just for tree huggers? Think again -- for IBM and other pinstriped redoubts, it?s all about boosting the bottom line.

Can Microsoft Catch Its Cool?
In a recent series of popular video ads, Apple portrayed itself as a young, hip guy challenging Microsoft's stodgy businessman. While that was an obvious marketing ploy, it is true that Apple (and Linux) users are often thought of as cooler than those who employ Microsoft Windows. How come?

White Paper

Get Better Results from your IT investments
In today's environment, you need to get the most out of your assets and people - all the while serving the strategic needs of your business and dealing with growth and acquisition issues. In addition, it is critically important to quantify results of those investments for leadership and accurately track service level agreements.

Unified Communications: Building the Modern and Mobile Workforce
A new generation of Unified Communications products is changing the way people work. By integrating voicemail, email, IM, presence and other technologies, employees can collaborate more effectively. Is your strategy in motion?

Deploying Advanced Security in an Empowered Branch
This webcast will explore how to extend advanced security capabilities into your branch network, including:

  • How Network Admission Control (NAC) can apply to branch endpoints
  • How to deploy Intrusion Prevention Systems (IPS) in a branch architecture
  • How to address branch content and messaging security vulnerabilities
  • The Support Impacts of Technical Complexity on Margins and Customer Satisfaction -- Citrix Online - GotoAssist
    SummaryThe latest SSPA Research Brief takes a close look at the support impacts of technical complexity on margins and customer satisfaction. Download the SSPA Research Brief today and discover how remote support technology can help by:

  • Reducing call-handling times
  • Increasing first-interaction closure rates
  • Deflecting phone interactions
  • Job Listings

    Featured Jobs:

    PNC Bank seeking Application Systems Manager II in Pittsburgh, PA

    Associated Electric Cooperative, Inc. seeking .Net Developer in Springfield, MO

    ITT Corporation seeking Manager, IT Business Systems in Fort Wayne, IN

    Agilent seeking IT Services Manager in Santa Clara, CA

    Champion and Partners Ltd seeking IC Chip Architect in London, GB

    For more great jobs, career-related news, features and services, please visit our "Career Center.

    Get More Out Of InformationWeek

    Try InformationWeek's RSS Feed

    Discover all InformationWeek's sites and newsletters

    Recommend This Newsletter To A Friend
    Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.

    Manage Your Newsletter Subscription

    More than 20,000 IT terms, more than 20,000 definitions:
    All at your fingertips, all in TechEncyclopedia

    Saw a TechWeb feature you want to see again?

    You are subscribed as #emailaddr#. To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

    Update your subscriber profile.

    Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

    Keep Getting This Newsletter
    Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:

    If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks. We take your privacy very seriously. Please review our Privacy Policy.

    InformationWeek Daily Newsletter
    A free service of InformationWeek and the TechWeb Network.
    Copyright (c) 2007 CMP Media LLC
    600 Community Drive
    Manhasset, N.Y. 11030

    © 2007  |  CMP Technology LLC  |  Privacy Statement  |  Terms Of Service

    Comment  | 
    Print  | 
    More Insights
    Newest First  |  Oldest First  |  Threaded View
    How Enterprises Are Attacking the IT Security Enterprise
    How Enterprises Are Attacking the IT Security Enterprise
    To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
    Register for InformationWeek Newsletters
    White Papers
    Current Issue
    2017 State of IT Report
    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
    Twitter Feed
    Sponsored Live Streaming Video
    Everything You've Been Told About Mobility Is Wrong
    Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
    Flash Poll