• Grid View
  • List View
  • IT Best Practices - Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Workplace violence is considered the most significant security threat to American business, according to a seventh annual Pinkerton survey completed by 286 corporate security professionals. The second most important security concern identified by the survey is the potential threat to Internet sites and computer networks. This concern jumped to second place this year from seventh last year. The study "Top Security Threats and Security Issues Facing Corporate America" was completed in May 2000 and identified the following top 10 security threats.

    March, 2002

  • Technology Trends - Will Microsoft's E-Business Plan Pay Off?

    Will Microsoft’s E-Business Plan Pay Off?

    Long-time users of Microsoft products are finding themselves in that familiar but disconcerting position again as they enter the e-business realm. Just as Microsoft did with Windows and the Internet, it is once more planning on a grand scale, delaying software launch dates, and confusing potential customers. Despite these drawbacks, the likelihood of Microsoft eventually bringing successful electronic commerce to market is high. And if the products even come close to their grandiose goals, the software will solve many problems for electronic merchants.

    March, 2002

  • IT Spending Benchmarks - 2000-2001 Industry Rankings by Number of Companies in the Sector (Oct 2000)

    2000-2001 Industry Rankings by Number of Companies in the Sector (Oct 2000)

    One way some supply chain operators identify industries within the U.S. that may by likely to participate in supply chains in 2000 and 2001 is to determine which industries have the largest number of companies in them. However, before recruiting all of the most densely populated industries into supply chains it is important for supply chain promoters to also examine the amount of revenue that is likely to flow through supply chains in the given industry. A large number of companies in an industry may mean it is a good target for supply chain participation, but supply chain promoters should not stop there.

    March, 2002

  • IT Spending Benchmarks - 2000-2001 Industry Potential to Participate in Supply Chain Systems (Oct 2000)

    2000-2001 Industry Potential to Participate in Supply Chain Systems (Oct 2000)

    To help organizations identify industries within the U.S. that have high potential for participating in supply chains in 2000 and 2001, Computer Economics ranked each industry by NAICS code in terms of its potential supply chain volume. Figure 1 shows the top ten industries that have the highest potential dollar amount flowing through supply chain systems in 2000 and 2001. The automobile wholesale sector's relative rank of 100.0 should indicate to supply chain operators looking to promote their systems that this industry has a high supply chain density and has many organizations to participate in new supply chains.

    March, 2002

  • IT Spending Benchmarks - 2000-2001 Industry Rankings by Revenue Volume (Oct 2000)

    2000-2001 Industry Rankings by Revenue Volume (Oct 2000)

    One way to identify industries within the U.S. that may by likely to participate in supply chains in 2000 and 2001 is to determine which industries have the largest amounts of revenue. However, before recruiting all of the top revenue industries into supply chains it is important for supply chain promoters to examine the portion of revenue that is likely to flow through supply chains in a given industry. Large volume in revenue is typically the first clue that the industry will participate in supply chains at a high rate during 2000 and 2001, but supply chain promoters should not stop there.

    March, 2002

  • IT Spending Benchmarks - 2000-2001 Potential of U.S. States to Participate in Supply Chain Systems (Oct 2000)

    2000-2001 Potential of U.S. States to Participate in Supply Chain Systems (Oct 2000)

    To help organizations identify areas within the U.S. that have high potential for participating in supply chains in 2000 and 2001, Computer Economics ranked each of the states relative to each other in terms of their potential supply chain volume. We concluded that California has the largest potential dollar amount flowing through supply chain systems. The state. s relative rank of 100.0 should indicate to supply chain operators looking to promote their systems that California has a high supply chain density and has many organizations to participate in new supply chains.

    March, 2002

  • IT Best Practices - Identifying Locations and Industries With High Potential for Supply Chain Participation

    Identifying Locations and Industries With High Potential for Supply Chain Participation

    When supply chain promoters must identify the best potential participants for their systems, several approaches can be used. The most effective technique is to determine which industries are likely to have the highest amount of money flowing through supply chains in the coming years. Looking at potential dollar volume in supply chains by state is another profitable way to find future supply chain participants. In addition, supply chain promoters may also look at the amount of total revenue in an industry as well as the total number of companies in the sector, but these are not as accurate measures.

    March, 2002

  • Technology Trends - Western Union Steps Up to the Web

    Western Union Steps Up to the Web

    Western Union Financial Services Inc., a subsidiary of First Data Corporation, announced in August 2000 its Western Union PayCash service, which allows consumers to pay for Internet purchases with cash at participating Western Union agent locations. The Western Union PayCash service is a unique payment option for Internet purchases because it requires no credit card, bankcard, or bank account. Consumers make their product selections online and bring their cash to a Western Union agent location, which in many cases is a nearby grocery store.

    March, 2002

  • Technology Trends - WAP Technology: Nokia Grows Beyond Being a Technology Company

    WAP Technology: Nokia Grows Beyond Being a Technology Company

    Nokia continues to strengthen its end-to-end WAP solution by offering a full range of WAP-compliant products including gateways, portals, mobile terminals, and browsers as well as a full range of tools for WAP-based content creation and delivery, end-user application platforms, and systems integration services. Nokia Professional Services is aggressively entering the service solutions market for planning, deploying, managing, and enhancing WAP products. Additionally, Nokia's alliances with many of the world's largest networking and application companies are driving the progress that will make mobile Internet a viable marketplace.

    March, 2002

  • IT Spending Benchmarks - MORE E-Sales Intelligence Reports for 2Q01: Retail and Wholesale Industries (May 2001)

    MORE E-Sales Intelligence Reports for 2Q01: Retail and Wholesale Industries (May 2001)

    Including data on Amazon.com, Sharper Image, J. Crew, Fingerhut, and Barnes & Noble.com.

    March, 2002

  • IT Best Practices - FTC Cupcake Party Nabs Mousetrapping Scammer

    FTC Cupcake Party Nabs Mousetrapping Scammer

    A cyberscammer who used more than 5,500 copycat Web addresses to divert surfers from their intended Internet destinations to one of his sites and hold them captive while he pelted their screens with a barrage of ads was charged by the Federal Trade Commission with violating federal laws. At the request of the FTC, a U.S. District Court enjoined his activities pending further order of the court. The FTC is going to court to force the defendant to give up his ill-gotten gains.

    March, 2002

  • IT Best Practices - Biometric Technologies for Computer Security

    Biometric Technologies for Computer Security

    Biometric technology has been applied to IT security for several years, adoption has been slow, and some applications are starting to become a reality, including fingerprint scanning, facial recognition, and voice verification. Nevertheless, the jury is still out as to how viable these technologies will be for widespread use in corporate IT environments.

    February, 2002

  • IT Best Practices - Computer Losses in 1998 and 1999

    Computer Losses in 1998 and 1999

    This article provides data concerning desktop and notebook (laptop) losses during 1998 and 1999, based on information provided by Safeware Insurance. Data provided includes number of incidents and value of loss, by cause. Causes include accidents, theft, power surge, lightning, transit, water/flood, and other.

    February, 2002

  • Technology Trends - Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    The ever-expanding Internet creates new opportunities for hackers to disrupt e-commerce daily. Network firewalls can do much to make your e-commerce site less attractive to hackers, though even the best guard dog cannot entirely overwhelm attempts to penetrate your security. This article provides recommendations for evaluating various approaches to firewall technology.

    February, 2002

  • Technology Trends - What Lies in the Future for the Mainframe Market?

    What Lies in the Future for the Mainframe Market?

    Mainframes are widely used to satisfy e-commerce, customer relationship management, ERP, and server consolidation requirements, but recent events presage major changes in past big iron trends. This report outlines the decline in mainframe installations and cost-per-MIPS for the period 1998-2003.

    February, 2002