• Grid View
  • List View
  • Technology Trends - Data Communications and Network Acronyms and Definitions

    Data Communications and Network Acronyms and Definitions

    This article provies a list of commonly used data communications, network abbreviations and acronyms. This list is helpful to IT managers who do not have an extensive background in data communications and networking.

    September, 2002

  • Technology Trends - Why, Whether, When to Migrate from VSE to z/OS—Cost/Benefit Tradeoffs

    Why, Whether, When to Migrate from VSE to z/OS—Cost/Benefit Tradeoffs

    Many VSE sites maintain a "steady as we go" attitude, focusing on incrementally growing application requirements. Evolving application needs can often be satisfied by upgrading within VSE, partnering Linux capabilities with VSE, or installing a small VSE-connected Unix/HP/NT system. These choices can be online faster and cost much less than undertaking z/OS migration, which typically requires 15-18 months and costs a million dollars.

    September, 2002

  • Technology Trends - Linux: Soon Appearing on a Mainframe Near Everyone?

    Linux: Soon Appearing on a Mainframe Near Everyone?

    As Linux becomes available on more computing platforms, the industry buzz regarding its characteristics, power, and appeal is inescapable and growing.

    September, 2002

  • Technology Trends - z/VM—What's Old Is New Again for Mainframe Productivity

    z/VM—What’s Old Is New Again for Mainframe Productivity

    Today's z/VM, Version 4.2, has a noble decades-long lineage, but has hardly grown stale; it plays an up-to-the-minute role in bringing enterprise-class services to diverse market sectors, often enabling mission-critical Internet services.

    September, 2002

  • IT Best Practices - Weak Security Allows Sales Reps to Defraud (July 2002)

    Weak Security Allows Sales Reps to Defraud (July 2002)

    Only weeks after WorldCom revealed that some of its top sales representatives had manipulated its antiquated incentive compensation system to defraud the company of millions of dollars, a survey of executives was conducted at the spring Synygy Incentive Compensation Conference, held in Phoenix in March 2002.

    September, 2002

  • Research Bytes - Socially Responsible Information Technology Management

    Socially Responsible Information Technology Management

    The rapid growth in the number of organizations and people using computers combined with global connectivity brings many new information technology management challenges. Many people feel that IT has gotten out of control.

    September, 2002

  • Research Bytes - IS Budget Allocations in Organizations with E-Commerce Applications in Place

    IS Budget Allocations in Organizations with E-Commerce Applications in Place

    Internet users are beginning to show their preferences. There has been a considerable amount of research accumulating from credible sources that indicate significant emerging patterns of Internet usage. We have also started to grasp what works and what flops on the Web.

    September, 2002

  • IT Best Practices - The Economic Impact of Software Bugs

    The Economic Impact of Software Bugs

    Software bugs, or errors, are so prevalent and so detrimental that they cost the U.S. economy an estimated $59.5 billion annually, or about 0.6% of the gross domestic product.

    September, 2002

  • Technology Trends - Online Ads and Online Purchasing (September 2002)

    Online Ads and Online Purchasing (September 2002)

    A June 2002 study by Chartered Institute of Marketing (CIM) found that new media channels have failed to make an impression.

    September, 2002

  • Technology Trends - E-Government Challenges (September 2002)

    E-Government Challenges (September 2002)

    A May 2002 report from the Computer Science and Telecommunications Board  reviews changes that could help governments move more quickly to provide services over the Internet. The report concludes that government has done much to leverage information technology (IT) to deploy e-government services, but much work remains before the vision of e-government can be fully realized.

    September, 2002

  • IT Staffing - Staffing the Contingency Planning Process (Sep 2002)

    Staffing the Contingency Planning Process (Sep 2002)

    IT systems are vulnerable to a variety of disruptions, ranging from mild to severe. Vulnerabilities may be minimized or eliminated through technical, management, or operational solutions as part of a risk management effort. Although it is virtually impossible to completely eliminate all risks, contingency planning is designed to mitigate the risk of system and service unavailability by focusing on effective and efficient recovery solutions.

    September, 2002

  • Technology Trends - Create E-Commerce Value Using Business Models (September 2002)

    Create E-Commerce Value Using Business Models (September 2002)

    Sales of goods sold online in the U.S. will reach $1.7 trillion by 2004, according to Computer Economics. European firms will sell another $600 billion in the same period. Clearly, successful e-commerce sites can be highly profitable in such a market, but competitive pressures will limit the successes to those websites that correctly implement value drivers into their business models.

    September, 2002

  • Technology Trends - In-Home Computer Use Research (August 2002)

    In-Home Computer Use Research (August 2002)

    The National Science Foundation (NSF) has analyzed publicly accessible sources of data for analyzing access to, and use of, IT in the home that could be used to generate statistically valid findings that could be generalized across the United States.

    August, 2002

  • Technology Trends - Information Warfare Expert Urges Hackers Not to Strike Back But to Help Investigate Instead

    Information Warfare Expert Urges Hackers Not to Strike Back But to Help Investigate Instead

    It has become clear that many hackers want to use their skills to avenge the attack on the World Trade Center and the Pentagon. Michael Erbschloe, Vice President of Research and author of "Information Warfare: How to Survive Cyber Attacks," says that hackers can do other more constructive things at this time.

    August, 2002

  • Technology Trends - Online Human Resources Survey: The Fortune 50

    Online Human Resources Survey: The Fortune 50

    Computer Economics surveyed Fortune 50 companies to determine how and to what extent these companies conduct human resources (HR) activities from their core, corporate website. As we expected, nearly all of these Fortune 50 corporate websites are being used to help the companies recruit new employees.

    August, 2002