• Grid View
  • List View
  • Technology Trends - Computer Economics Estimates $15.8 Billion to Restore IT and Communications Capabilities After Terrorist Attacks

    Computer Economics Estimates $15.8 Billion to Restore IT and Communications Capabilities After Terrorist Attacks

    Computer Economics has examined several factors and interviewed many information technology (IT) and communications workers to analyze the economic impact of recent terrorist attacks on the IT and communications services in Manhattan and at the Pentagon. To date we have complied information that shows that the costs of restoring IT and communications capabilities is $15.8 billion.

    August, 2002

  • IT Best Practices - Managing Software Acquisition

    Managing Software Acquisition

    Evaluation of the metrics of a project, Project A, warned us that the schedule proposed by the contractor-14 months-was unrealistic. Thirteen months later, as we expected, the contractor had to add nine months to the delivery schedule. This kind of delay happened so often as to be characteristic. The problem facing the KPN purchasing organization was making measurement effective at the beginning of the purchasing process, rather than a sad footnote at the end of it.

    August, 2002

  • Technology Trends - Defining Your Website Hosting Requirements

    Defining Your Website Hosting Requirements

    When identifying your website's hosting needs it is important to consider your company's goals. A wide array of hosting options is available for you to store, deliver, and receive information from customers and potential customers from around the world. Knowing your company's requirements will help you choose a Web hosting company with the proper "fit."

    August, 2002

  • Technology Trends - Virus Attacks Cost Organizations $17.1 Billion in 2000

    Virus Attacks Cost Organizations $17.1 Billion in 2000

    Computer Economics has determined that the economic impact of virus attacks on information systems around the world amounted to $17.1 billion in 2000. Economic impact is comprised of the costs to clean viruses from networks, servers, and client systems; restore lost or damaged files; and the lost productivity of workers caused by system outages and downtime. The economic impact of virus attacks on information systems around the world amounted to $12.1 billion in 1999.

    August, 2002

  • Technology Trends - Storage Price Dynamics Tilt Toward Purchasers

    Storage Price Dynamics Tilt Toward Purchasers

    Price wars among vendors, along with ever-improving technology, continue to offer buyers superior storage devices at lower unit prices. Both more cost-effective methods for manufacturing the devices and new storage architectures are moving the industry toward standardization and cheaper mainstream applications. Two architectural areas that show particularly notable gains are desktop storage and storage area networks (SANs).

    August, 2002

  • Technology Trends - Server Clustering Grows More Attractive (April 2000)

    Server Clustering Grows More Attractive (April 2000)

    Good reasons for implementing server clusters are rapidly increasing, especially in view of the exploding number of Web servers. Server clusters offer the ability to consolidate multiple servers while saving memory space and optimizing resource utilization. This report outlines the various products that can be used to implement clustering.

    August, 2002

  • Technology Trends - Wireless Technology to Boost Internet Usage

    Wireless Technology to Boost Internet Usage

    Internet users are increasingly turning to broadband wireless solutions as frustrations with dial-up and hardwired connectivity grow. Depending on location, many users have the option of selecting a wireless Internet link that offers speeds of 2 Mbps to 11 Mbps. The economy of wireless Internet is often attractive.

    August, 2002

  • Technology Trends - The New AS/400es (July 2000)

    The New AS/400es (July 2000)

    IBM has announced that its new additions to the AS/400e series, the 800 series servers, will be available in August 2000 along with the newest version of OS/400, V4R5. The new servers are designed specifically for business-to-business applications, such as supply chain, CRM, server-side Java, and Domino.

    August, 2002

  • IT Best Practices - Anti-Virus Protection Not Used by PC Owners

    Anti-Virus Protection Not Used by PC Owners

    Almost a quarter of home and office PC users running anti-virus software don't update it regularly, leaving themselves vulnerable to newly minted viruses, according to a June 2000 survey conducted by Central Command, a supplier of anti-virus software. This high awareness of computer viruses following outbreaks of the Chernobyl and Melissa virus and the LoveLetter worm (which disabled millions of PCs around the world) have obviously not translated into safer computing practices. The survey was the largest ever conducted on the topic and was emailed to nearly half a million PC users. It had 54,091 responses--a 16% response rate.

    August, 2002

  • IT Best Practices - Click on the Dotted Line: Enforceability of "Click-Wrap" Agreements (Dec 2000)

    Click on the Dotted Line: Enforceability of "Click-Wrap" Agreements (Dec 2000)

    The name "click-wrap agreement" describes contracts executed online without paper or physical signatures. Instead, one party proposes the terms, and the other simply "clicks" on a button indicating agreement. Typical uses of click-wrap agreements include establishing terms for the download and use of online services or software, or acknowledging a website's terms of use.

    August, 2002

  • Technology Trends - Streaming Content Online: Navigating the Hazards (Nov 2000)

    Streaming Content Online: Navigating the Hazards (Nov 2000)

    As the number of websites with streaming content grows each day, and as consumers embrace the technologies which allow access, the challenge of protecting the content from unauthorized copying must be faced. As the online world watches the Napster saga, recognition of the seriousness of the dilemma has finally dawned.

    August, 2002

  • IT Best Practices - Choice of Law in Cybyerspace

    Choice of Law in Cybyerspace

    For companies doing business on the Web, it has become standard to state in the website's terms and conditions of use that users who have a dispute must pursue such claims within the state in which the company is located, and pursuant to that state's laws. From the company's perspective, this makes sense, as fighting lawsuits in fifty different states, and even overseas, could prove prohibitively costly and strategically undesirable. Consumers have argued that the system is unfair, however, as it requires a user to bring a claim far from home, even for a small dispute.

    August, 2002

  • IT Staffing - Sign on the Dot-Com Line (Aug 2000)

    Sign on the Dot-Com Line (Aug 2000)

    After years of talk, electronic signatures are finally becoming a reality. A new law goes into effect October 1, 2000 which will facilitate the use of electronic signatures to secure electronic transactions. The term "electronic signature" has become the generic name for what is actually a wide variety of means of authenticating the identity of parties to a transaction. One strength of the new law is that it is broad enough to embrace the plethora of electronic signature verification mechanisms, rather than promoting the use of just one.

    August, 2002

  • IT Best Practices - The Ins and Outs of Online Ads (Jul 2000)

    The Ins and Outs of Online Ads (Jul 2000)

    Until now, the rule for online advertisements and disclosures was that the same basic principles of fairness and honesty which apply to other media were equally applicable online. That policy lacked any detail and did not provide any substantive guidance to online merchants and advertisers. As a result of this gray area, unscrupulous advertisers exploited the ambiguity through online practices that ranged from misleading to outright fraud. The government has intervened in severe cases, but until recently, no affirmative policy existed.

    August, 2002

  • IT Best Practices - Cybersquatters Lose Ground (Mar 2000)

    Cybersquatters Lose Ground (Mar 2000)

    One of the most difficult aspects of online business is dealing with disputes over domain names. Late in 1999, ICANN, the Internet governing body, finally created a uniform domain name dispute resolution policy. The policy replaces Network Solutions' old dispute resolution policy and requires that all domain name registrants be subject to a mandatory administrative proceeding to resolve certain domain name disputes.

    August, 2002