• Grid View
  • List View
  • IT Salaries - Contract Labor Rates 4Q01

    Contract Labor Rates 4Q01

    This report shows contract labor rates for the second half of 2001 along with projected rates for 2002 and for the first half of 2003.

    August, 2002

  • IT Spending Benchmarks - More E-Sales Intelligence Reports for 2H01: Retail and Wholesale Industries (Jan 2002)

    More E-Sales Intelligence Reports for 2H01: Retail and Wholesale Industries (Jan 2002)

    This report outlines e-sales intilligence reports for 2H01: Retail and wholesale Industries (Jan 2002)

    August, 2002

  • IT Best Practices - The Federal Cyber Service Scholarship for Service Program (August 2002)

    The Federal Cyber Service Scholarship for Service Program (August 2002)

    The Federal Cyber Service Scholarship for Service (SFS) program provides funding to colleges and universities for scholarships and capacity building in the information assurance and computer security fields. This includes the education of students in information technology security and for institutional or faculty development in the area of information assurance and computer security.

    August, 2002

  • Technology Trends - Managing Critical Infrastructure Protection (August 2002)

    Managing Critical Infrastructure Protection (August 2002)

    Executive Order 13231 directs the protection of information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems.

    August, 2002

  • IT Best Practices - Checklist for Evaluating E-Commerce Security

    Checklist for Evaluating E-Commerce Security

    Numerous successful website violations demonstrate e-commerce’s vulnerability to security threats. A successful security program necessitates a continuing cycle of evaluating, improving, and rebuilding defenses. This article provides a checklist to assist in developing a cost-effective policy that takes into account all factors required for success. (3 pp.)

    August, 2002

  • IT Staffing - Meeting the Continuing IT Staffing Challenge

    Meeting the Continuing IT Staffing Challenge

    Now that Y2K mania is winding down, many IT managers may be thinking that the IT staffing crunch should no longer be a problem. After all, large numbers of contractors, consultants, and laid-off programmers are hitting the streets now that the millennium bug has been slain. So there should be plenty of opportunities to add staff at economical prices, right? Of course not! Managers must keep in mind the fact that IT is always advancing, and workers at the cutting edge will remain scarce and expensive. On the other hand, organizations that need COBOL programmers today can shop at the bargain counter.

    August, 2002

  • IT Staffing - 21st Century Workforce Commission Recommendations (Jul 2000)

    21st Century Workforce Commission Recommendations (Jul 2000)

    Century Workforce Commission was established by The Workforce Investment Act (Pub. L. No. 105-220), signed into law on August 7, 1998. The Commission was charged with carrying out a study of the information technology workforce in the U.S. The statute directs the Commission to issue recommendations to the President and Congress within six months. The Commission first met on November 16, 1999 and will issue its recommendations by summer 2000.

    August, 2002

  • IT Staffing - Misrepresentation on Resumes

    Misrepresentation on Resumes

    The ADP Screening and Selection Services Hiring Index shows the extent of misrepresentation that exists on people’s resumes. The study also indicates what employers can look for during the hiring process to avoid common hiring risks. Overall, through the years, the Index has shown a consistent trend of high hiring risks. The trends of resume fraud are consistent over the past several years.

    August, 2002

  • IT Best Practices - IT Security:  Perceptions, Awareness and Practices

    IT Security: Perceptions, Awareness and Practices

    Most IT executives believe the industry has not done a good enough job in addressing security for IT products and services.

    August, 2002

  • Technology Trends - E-Commerce and ERP Software Acquisition Plans for 2002 (August 2002)

    E-Commerce and ERP Software Acquisition Plans for 2002 (August 2002)

    Most sectors continue to invest in e-commerce software, while the acquisition of ERP software seems to have slowed according to the 13th annual Information Systems and E-Business Spending study conducted by Computer Economics.

    August, 2002

  • IT Best Practices - Sample Terms of Use Statements for Websites (Aug 2002)

    Sample Terms of Use Statements for Websites (Aug 2002)

    Your organization does not have to be an e-commerce company, sell things over the Internet, or meet any other specific criteria to benefit from posting a terms of use statement. Computer Economics advises all organizations with websites to post terms of use statements.

    August, 2002

  • Technology Trends - The Web Polygraph Benchmarking Tool (August 2002)

    The Web Polygraph Benchmarking Tool (August 2002)

    Web Polygraph is a freely available benchmarking tool for caching proxies, origin server accelerators, L4/7 switches, content filters, and other web intermediaries.

    August, 2002

  • IT Spending Benchmarks - AT&T Internet Access and Service Charges (August 2002)

    AT&T Internet Access and Service Charges (August 2002)

    The following table shows typical AT&T rates for Internet access for base service levels for a wide range of connectivity options.

    August, 2002

  • Research Bytes - Expectations About Cyberattacks (Aug 2002)

    Expectations About Cyberattacks (Aug 2002)

    Computer Economics developed and conducted a survey on IT security perceptions, awareness, and practices during May and June of 2002. One finding is that considerably more people think that large-scale cyberattacks will be launched by terrorists than by a military.

    August, 2002

  • Research Bytes - Battles Over Spam Continue

    Battles Over Spam Continue

    Bulk commercial email (spam) has become a common practice that is almost always an intrusion and a nuisance for the recipient. Legislators in many states have responded to the public outcry with laws designed to bring some accountability to the spammers and some recourse for the recipients.

    August, 2002