• Grid View
  • List View
  • IT Best Practices - Above Average(s): Measuring Application Development Performance

    Above Average(s): Measuring Application Development Performance

    If I was in a room with the starting centers from every team in the NBA, I could say I was about 7 feet tall--based on the average of everyone present. Although misleading, this would be a true statement. IT organizations risk falling into a similar trap of misperception if they measure application development (AD) quality and productivity based on industry averages or high-level aggregates from myriad sources. Such an approach rarely provides meaningful insight into how well or poorly you're doing. More importantly, averages can't tell you what to do to improve your software development. To use measurement effectively, it's necessary to drill down to identify specific performance gaps and take specific actions toward improvement.

    March, 2002

  • IT Best Practices - Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Internet Security Rises to No. 2 Concern in Annual Pinkerton Study (Sep 2000)

    Workplace violence is considered the most significant security threat to American business, according to a seventh annual Pinkerton survey completed by 286 corporate security professionals. The second most important security concern identified by the survey is the potential threat to Internet sites and computer networks. This concern jumped to second place this year from seventh last year. The study "Top Security Threats and Security Issues Facing Corporate America" was completed in May 2000 and identified the following top 10 security threats.

    March, 2002

  • IT Best Practices - Identifying Locations and Industries With High Potential for Supply Chain Participation

    Identifying Locations and Industries With High Potential for Supply Chain Participation

    When supply chain promoters must identify the best potential participants for their systems, several approaches can be used. The most effective technique is to determine which industries are likely to have the highest amount of money flowing through supply chains in the coming years. Looking at potential dollar volume in supply chains by state is another profitable way to find future supply chain participants. In addition, supply chain promoters may also look at the amount of total revenue in an industry as well as the total number of companies in the sector, but these are not as accurate measures.

    March, 2002

  • IT Best Practices - FTC Cupcake Party Nabs Mousetrapping Scammer

    FTC Cupcake Party Nabs Mousetrapping Scammer

    A cyberscammer who used more than 5,500 copycat Web addresses to divert surfers from their intended Internet destinations to one of his sites and hold them captive while he pelted their screens with a barrage of ads was charged by the Federal Trade Commission with violating federal laws. At the request of the FTC, a U.S. District Court enjoined his activities pending further order of the court. The FTC is going to court to force the defendant to give up his ill-gotten gains.

    March, 2002

  • IT Best Practices - Biometric Technologies for Computer Security

    Biometric Technologies for Computer Security

    Biometric technology has been applied to IT security for several years, adoption has been slow, and some applications are starting to become a reality, including fingerprint scanning, facial recognition, and voice verification. Nevertheless, the jury is still out as to how viable these technologies will be for widespread use in corporate IT environments.

    February, 2002

  • IT Best Practices - Computer Losses in 1998 and 1999

    Computer Losses in 1998 and 1999

    This article provides data concerning desktop and notebook (laptop) losses during 1998 and 1999, based on information provided by Safeware Insurance. Data provided includes number of incidents and value of loss, by cause. Causes include accidents, theft, power surge, lightning, transit, water/flood, and other.

    February, 2002

  • IT Best Practices - Build a Security Conscious Organization

    Build a Security Conscious Organization

    Based on Computer Economics projections, computer crime will grow by an estimated 230 percent during 2001. Similar trends are expected with Internet fraud. All IT managers would agree that securing their IT resources is a necessity, but many are not willing to commit to the continual effort required.

    February, 2002

  • IT Best Practices - eXtreme Programming Opens New Possibilities (Feb 2002)

    eXtreme Programming Opens New Possibilities (Feb 2002)

    The only certainties in software development are that the application will arrive late, cost more than expected, and fail to meet all of its functional requirements. Based on numerous evaluations conducted by Computer Economics, more than 90 percent of large-scale software applications fail to meet at least one of these goals, and about half of all developmental efforts are abandoned without delivering any useful product. The ever-growing demand for new software, along with increasing complexity of the applications, will only exacerbate the situation.

    February, 2002

  • IT Best Practices - The Limited Personal Use of IT Resources

    The Limited Personal Use of IT Resources

    The United States federal government has been working to develop a balanced perspective and policy toward the personal use of government-owned information technology and services by government employees. This personal use must not result in loss of employee productivity or interfere with official duties. Moreover, such use must result in only minimal additional expense to the government

    February, 2002

  • IT Best Practices - Privacy Remains an Issue Among Consumers  (Jan 2002)

    Privacy Remains an Issue Among Consumers (Jan 2002)

    Thirty-five percent of consumers say they are more concerned about their financial privacy than they were a year ago, according to a survey released by Star Systems, a Concord EFS subsidiary. The other 65 percent, however, report either the same level (59 percent) or a lower level (6 percent) of concern. And 61 percent of respondents are satisfied with the way their primary financial institution has informed them of its privacy policies.

    January, 2002

  • IT Best Practices - What Copy Protection Means to E-Commerce (Nov 2001)

    What Copy Protection Means to E-Commerce (Nov 2001)

    Intellectual property owners are eager to prevent a repeat of the lack of copy protection on CDs and CD-ROMs. When record companies launched the CD over 20 years ago, they decided not to encrypt it. That decision simplifies copying or pirating any information recorded in CD format. Now a variety of schemes are being proposed to protect information on the Internet and new media formats such as DVDs. The question of whether these protection methods will be viable and what they offer content producers has complex answers.

    November, 2001

  • IT Best Practices - Review Your System Security Now

    Review Your System Security Now

    The probability that any computer system will become the victim of a security attack is growing exponentially. Recent experience with the Code Red worm, for example, showed that over half a million hosts were infected and that it cost over $1 billion to remediate infected systems. Our research indicates the trend will continue toward increasing security threats.

    November, 2001

  • IT Best Practices - Perils and Profits Line the B2B Path (April 2001)

    Perils and Profits Line the B2B Path (April 2001)

    The reality of business-to-business (B2B) commerce is that purchasers seldom achieve a discount better than 5 percent more than they could have gained through negotiating in the old brick-and-mortar world. Many times the savings from B2B transactions are not even that good. This lack of savings from online trading helps explain the fact that purchasers have been slow coming to B2B and that most agreements they had with their traditional suppliers remain in place. Clearly B2B merchants will have to do better to wean buyers from their usual way of doing business.

    April, 2001

  • IT Best Practices - E-Commerce Site Security Pays Off (Oct 2000)

    E-Commerce Site Security Pays Off (Oct 2000)

    Virus attacks, credit card fraud, website content modifications, proprietary information theft, and denial of service are all reasons to recognize that protecting e-commerce is essential. Failure to do so will cost your company in dollars and cents. Not only is your organization susceptible to lawsuits from customers and business partners, but also many users are uncomfortable using e-commerce for purchasing because of these threats.

    October, 2000

  • IT Best Practices - Insurance Against Internet Security Breaches

    Insurance Against Internet Security Breaches

    In light of the rash of high-profile security incidences, major insurance carriers are now offering coverage against Internet and e-commerce security breaches.

    September, 2000