-

Computer Economics Estimates $15.8 Billion to Restore IT and Communications Capabilities After Terrorist Attacks
Computer Economics has examined several factors and interviewed many information technology (IT) and communications workers to analyze the economic impact of recent terrorist attacks on the IT and communications services in Manhattan and at the Pentagon. To date we have complied information that shows that the costs of restoring IT and communications capabilities is $15.8 billion.
August, 2002
-

Managing Software Acquisition
Evaluation of the metrics of a project, Project A, warned us that the schedule proposed by the contractor-14 months-was unrealistic. Thirteen months later, as we expected, the contractor had to add nine months to the delivery schedule. This kind of delay happened so often as to be characteristic. The problem facing the KPN purchasing organization was making measurement effective at the beginning of the purchasing process, rather than a sad footnote at the end of it.
August, 2002
-

Defining Your Website Hosting Requirements
When identifying your website's hosting needs it is important to consider your company's goals. A wide array of hosting options is available for you to store, deliver, and receive information from customers and potential customers from around the world. Knowing your company's requirements will help you choose a Web hosting company with the proper "fit."
August, 2002
-

Virus Attacks Cost Organizations $17.1 Billion in 2000
Computer Economics has determined that the economic impact of virus attacks on information systems around the world amounted to $17.1 billion in 2000. Economic impact is comprised of the costs to clean viruses from networks, servers, and client systems; restore lost or damaged files; and the lost productivity of workers caused by system outages and downtime. The economic impact of virus attacks on information systems around the world amounted to $12.1 billion in 1999.
August, 2002
-

Storage Price Dynamics Tilt Toward Purchasers
Price wars among vendors, along with ever-improving technology, continue to offer buyers superior storage devices at lower unit prices. Both more cost-effective methods for manufacturing the devices and new storage architectures are moving the industry toward standardization and cheaper mainstream applications. Two architectural areas that show particularly notable gains are desktop storage and storage area networks (SANs).
August, 2002
-

Server Clustering Grows More Attractive (April 2000)
Good reasons for implementing server clusters are rapidly increasing, especially in view of the exploding number of Web servers. Server clusters offer the ability to consolidate multiple servers while saving memory space and optimizing resource utilization. This report outlines the various products that can be used to implement clustering.
August, 2002
-

Wireless Technology to Boost Internet Usage
Internet users are increasingly turning to broadband wireless solutions as frustrations with dial-up and hardwired connectivity grow. Depending on location, many users have the option of selecting a wireless Internet link that offers speeds of 2 Mbps to 11 Mbps. The economy of wireless Internet is often attractive.
August, 2002
-

The New AS/400es (July 2000)
IBM has announced that its new additions to the AS/400e series, the 800 series servers, will be available in August 2000 along with the newest version of OS/400, V4R5. The new servers are designed specifically for business-to-business applications, such as supply chain, CRM, server-side Java, and Domino.
August, 2002
-

Anti-Virus Protection Not Used by PC Owners
Almost a quarter of home and office PC users running anti-virus software don't update it regularly, leaving themselves vulnerable to newly minted viruses, according to a June 2000 survey conducted by Central Command, a supplier of anti-virus software. This high awareness of computer viruses following outbreaks of the Chernobyl and Melissa virus and the LoveLetter worm (which disabled millions of PCs around the world) have obviously not translated into safer computing practices. The survey was the largest ever conducted on the topic and was emailed to nearly half a million PC users. It had 54,091 responses--a 16% response rate.
August, 2002
-

Click on the Dotted Line: Enforceability of "Click-Wrap" Agreements (Dec 2000)
The name "click-wrap agreement" describes contracts executed online without paper or physical signatures. Instead, one party proposes the terms, and the other simply "clicks" on a button indicating agreement. Typical uses of click-wrap agreements include establishing terms for the download and use of online services or software, or acknowledging a website's terms of use.
August, 2002
-

Streaming Content Online: Navigating the Hazards (Nov 2000)
As the number of websites with streaming content grows each day, and as consumers embrace the technologies which allow access, the challenge of protecting the content from unauthorized copying must be faced. As the online world watches the Napster saga, recognition of the seriousness of the dilemma has finally dawned.
August, 2002
-

Choice of Law in Cybyerspace
For companies doing business on the Web, it has become standard to state in the website's terms and conditions of use that users who have a dispute must pursue such claims within the state in which the company is located, and pursuant to that state's laws. From the company's perspective, this makes sense, as fighting lawsuits in fifty different states, and even overseas, could prove prohibitively costly and strategically undesirable. Consumers have argued that the system is unfair, however, as it requires a user to bring a claim far from home, even for a small dispute.
August, 2002
-

Sign on the Dot-Com Line (Aug 2000)
After years of talk, electronic signatures are finally becoming a reality. A new law goes into effect October 1, 2000 which will facilitate the use of electronic signatures to secure electronic transactions. The term "electronic signature" has become the generic name for what is actually a wide variety of means of authenticating the identity of parties to a transaction. One strength of the new law is that it is broad enough to embrace the plethora of electronic signature verification mechanisms, rather than promoting the use of just one.
August, 2002
-

The Ins and Outs of Online Ads (Jul 2000)
Until now, the rule for online advertisements and disclosures was that the same basic principles of fairness and honesty which apply to other media were equally applicable online. That policy lacked any detail and did not provide any substantive guidance to online merchants and advertisers. As a result of this gray area, unscrupulous advertisers exploited the ambiguity through online practices that ranged from misleading to outright fraud. The government has intervened in severe cases, but until recently, no affirmative policy existed.
August, 2002
-

Cybersquatters Lose Ground (Mar 2000)
One of the most difficult aspects of online business is dealing with disputes over domain names. Late in 1999, ICANN, the Internet governing body, finally created a uniform domain name dispute resolution policy. The policy replaces Network Solutions' old dispute resolution policy and requires that all domain name registrants be subject to a mandatory administrative proceeding to resolve certain domain name disputes.
August, 2002
