-
Make Knowledge Management Pay Off Through New Collaborations (Dec 2000)
Knowledge management (otherwise known as information sharing, human capital, or intellectual property) has absorbed the efforts and money of many organizations. Unfortunately, many of these often expensive efforts have not led to positive returns. Studies of returns on these efforts frequently show that they fail to achieve their goals and sometimes are not even minimally effective. Typically three-quarters of these projects do not meet full expectations and half are total write-offs.
August, 2002
-
Digital Signatures Present New E-commerce Opportunities
The digital signature law signed by President Clinton in early summer became effective October 1, 2000. Although some aspects of the legislation will phase in over the next year, e-commerce organizations need to begin implementation now. There are a number of unresolved questions related to the Electronic Signatures in Global and National Commerce Act, otherwise known as E-Sign, that must be faced. Waiting until all of the answers are known, however, is not advised.
August, 2002
-
The E-Business Overview: IT Architecture
As e-business applications grow from departmental and divisional applications into critical enterprise systems, corporations are re-visiting their web architectures and fine-tuning their engines for optimal business performance. This analysis explores how e-business architecture can be built and optimized. We also take a look at recent architectural demands of flexibility and adherence to standards.
August, 2002
-
Opportunity Management Systems
The purpose of an Opportunity Management System (OMS) is to aid professional service providers in managing complex, confidential, and often sensitive business relationships between the provider and clients. To accomplish this, an OMS must be able to create intelligence in a form that can readily be used by staff with account management responsibility.
August, 2002
-
Cybercrime Fighting Update
The National Institute of Justice, an office of the U.S. Department of Justice, released in August 2000 a brief of a forthcoming report covering the state of cybercrime fighting capabilities in the United States. The brief emphasized that there is a compelling need to better address the requirements of state and local law enforcement agencies in detecting, investigating, and prosecuting individuals who commit electronic crimes. This article provides key findings from the report.
August, 2002
-
E-Insurance to Help Cover the Cost of E-Attacks
A new survey reveals many of the nation's largest organizations are not prepared to handle e-commerce and e-communication risks. From dot-com companies to brick-and-mortar businesses using the Internet to dispense information or sell products, few organizations have implemented the type of comprehensive e-risk management program that can limit electronic exposures and reduce e-liability.
August, 2002
-
Rentable Applications Give Little Businesses Big Tools
Expect to hear more about rentable applications that can be downloaded through your Internet Service Provider (ISP). The first of these types of applications, other than email and ISPs, made their debut to the public in the latter half of 1998.
August, 2002
-
IT Ergonomics Add New Element to TCO
The threat of litigation and the filing of widespread workmanâs compensation claims are forcing companies to find remedies for the poor ergonomics of standardized off-the-shelf IT products. To determine how large corporations are dealing with this problem, Computer Economics conducted a focus group of 16 companies that reported they had remedies in place. We also contacted five of our associates in the legal field and asked their opinion of potential corporate liability of IT ergonomics.
August, 2002
-
Corporate Expenditure Forecasts for CRM
Although Customer Relationship Management (CRM) systems are still in their technology development phase, companies have spent close to $4 billion on CRM software this year. Factoring in all surrounding expenses, CRM grew to a nearly $50 billion industry in 1999 and is expected to grow significantly through 2003.
August, 2002
-
The Risks of Storage Area Networks
Storage area networks (SAN) are beginning to demonstrate their utility. The value of transporting storage data at 100 Mbps, without bogging down LANs using tradition network attached storage (NAS), should not be underestimated. On the other hand, SAN technology is clearly an emerging one that suffers from such problems as poor interoperability among heterogeneous Fibre Channel products and inadequate management utilities, which must be resolved.
August, 2002
-
Public Key Encryption Gains as RSA Algorithm Enters the Public Domain
Public key encryption infrastructure (PKI) pervades the use of the Internet and e-commerce. This technology is the basis for protection of the Webâs Secure Sockets Layer (SSL), digital certification, email encryption,
August, 2002
-
The XML Scorecard
The theory behind XML has always been attractive, and the potential cross-platform usability of XML applications is something that many system developers have looked forward to for several years. There has been considerable activity during the last year in the XML arena and 2000 may well be the pivotal year in the emergence of XML-based applications.
August, 2002
-
Confronting the Windows 2000 Migration Dilemma
Regardless of how Microsoft resolves its antitrust problems with the Justice Department, Windows 2000 remains the key to future prosperity. In pushing the operating system, Microsoft is touting improved speed, stability, scalability, and security.
August, 2002
-
Wireless Internet Training Terminals
Computer Economics anticipates that within the next few years, private companies, colleges and universities, military organizations, and perhaps a small number of primary and secondary schools will start using wireless Internet devices for education or training purposes. The key advantage of wireless Internet training terminal (WITT) devices is that they provide an anywhere, anytime platform for education because they do not require external power sources or physical connections to the Internet.
August, 2002
-
Technology Discounts: Discounts from Resellers for Selected Brands (Oct 2000)
Figure 1 shows discounts provided by resellers on the product lines from various manufacturers. Some of the most significant discounts are available from Welcom, Visio, Cheyenne, and Computer Associates, for which resellers reported discounts of more than 45 percent.
August, 2002