• Grid View
  • List View
  • IT Spending Benchmarks - MORE E-Sales Intelligence Reports for 2Q01: Retail and Wholesale Industries (May 2001)

    MORE E-Sales Intelligence Reports for 2Q01: Retail and Wholesale Industries (May 2001)

    Including data on Amazon.com, Sharper Image, J. Crew, Fingerhut, and Barnes & Noble.com.

    March, 2002

  • IT Best Practices - FTC Cupcake Party Nabs Mousetrapping Scammer

    FTC Cupcake Party Nabs Mousetrapping Scammer

    A cyberscammer who used more than 5,500 copycat Web addresses to divert surfers from their intended Internet destinations to one of his sites and hold them captive while he pelted their screens with a barrage of ads was charged by the Federal Trade Commission with violating federal laws. At the request of the FTC, a U.S. District Court enjoined his activities pending further order of the court. The FTC is going to court to force the defendant to give up his ill-gotten gains.

    March, 2002

  • IT Best Practices - Biometric Technologies for Computer Security

    Biometric Technologies for Computer Security

    Biometric technology has been applied to IT security for several years, adoption has been slow, and some applications are starting to become a reality, including fingerprint scanning, facial recognition, and voice verification. Nevertheless, the jury is still out as to how viable these technologies will be for widespread use in corporate IT environments.

    February, 2002

  • IT Best Practices - Computer Losses in 1998 and 1999

    Computer Losses in 1998 and 1999

    This article provides data concerning desktop and notebook (laptop) losses during 1998 and 1999, based on information provided by Safeware Insurance. Data provided includes number of incidents and value of loss, by cause. Causes include accidents, theft, power surge, lightning, transit, water/flood, and other.

    February, 2002

  • Technology Trends - Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    The ever-expanding Internet creates new opportunities for hackers to disrupt e-commerce daily. Network firewalls can do much to make your e-commerce site less attractive to hackers, though even the best guard dog cannot entirely overwhelm attempts to penetrate your security. This article provides recommendations for evaluating various approaches to firewall technology.

    February, 2002

  • Valuations - Top Ten Steps for Disposing of Obsolete Computer Equipment

    Top Ten Steps for Disposing of Obsolete Computer Equipment

    As the glut of high-tech junk accumulates, businesses are facing increasing pressure to properly dispose of obsolete computer hardware. In addition to compromising the environment, improper disposal of obsolete computer hardware can result in leakage of proprietary company information and violation of new federal privacy laws that ban the disclosure of non-public financial and medical information about employees and customers.  This article provides a checklist of questions to simplify the process of electronics disposal and comply with new federal privacy regulations. (3 pp.)

    February, 2002

  • Technology Trends - What Lies in the Future for the Mainframe Market?

    What Lies in the Future for the Mainframe Market?

    Mainframes are widely used to satisfy e-commerce, customer relationship management, ERP, and server consolidation requirements, but recent events presage major changes in past big iron trends. This report outlines the decline in mainframe installations and cost-per-MIPS for the period 1998-2003.

    February, 2002

  • IT Best Practices - Build a Security Conscious Organization

    Build a Security Conscious Organization

    Based on Computer Economics projections, computer crime will grow by an estimated 230 percent during 2001. Similar trends are expected with Internet fraud. All IT managers would agree that securing their IT resources is a necessity, but many are not willing to commit to the continual effort required.

    February, 2002

  • IT Best Practices - eXtreme Programming Opens New Possibilities (Feb 2002)

    eXtreme Programming Opens New Possibilities (Feb 2002)

    The only certainties in software development are that the application will arrive late, cost more than expected, and fail to meet all of its functional requirements. Based on numerous evaluations conducted by Computer Economics, more than 90 percent of large-scale software applications fail to meet at least one of these goals, and about half of all developmental efforts are abandoned without delivering any useful product. The ever-growing demand for new software, along with increasing complexity of the applications, will only exacerbate the situation.

    February, 2002

  • Technology Trends - Peer-to-Peer Continues to Build Enterprise Capabilities (Feb 2002)

    Peer-to-Peer Continues to Build Enterprise Capabilities (Feb 2002)

    Peer-to-peer (P2P) computing, which has received most of its media attention from noncommercial Internet applications, is appearing in viable enterprise applications and gaining maturity through widely supported industry working groups. P2P, in its most basic form, is a decentralized computer network that communicates without the need for a dedicated server.

    February, 2002

  • IT Best Practices - The Limited Personal Use of IT Resources

    The Limited Personal Use of IT Resources

    The United States federal government has been working to develop a balanced perspective and policy toward the personal use of government-owned information technology and services by government employees. This personal use must not result in loss of employee productivity or interfere with official duties. Moreover, such use must result in only minimal additional expense to the government

    February, 2002

  • IT Best Practices - Privacy Remains an Issue Among Consumers  (Jan 2002)

    Privacy Remains an Issue Among Consumers (Jan 2002)

    Thirty-five percent of consumers say they are more concerned about their financial privacy than they were a year ago, according to a survey released by Star Systems, a Concord EFS subsidiary. The other 65 percent, however, report either the same level (59 percent) or a lower level (6 percent) of concern. And 61 percent of respondents are satisfied with the way their primary financial institution has informed them of its privacy policies.

    January, 2002

  • Technology Trends - How to Make CRM Financially Viable

    How to Make CRM Financially Viable

    The purpose of customer relationship management (CRM) is to provide a dialog between your customers and your business. This goal implies that an organization should commit itself to major internal changes because the key to successful CRM implementation is not limited to IT issues. Rather, success depends on interdepartmental cooperation and superb leadership. The main reason that many firms have failed in their CRM deployments revolves around failing to grasp these concepts.

    January, 2002

  • IT Salaries - IT Labor Market in 2002

    IT Labor Market in 2002

    Many IT professionals are looking for a job these days. Those who have been laid off are searching for new opportunities, while those still employed are worried about the stability of their current positions. This report analyzes trends in the IT job market by analyzing annual percentage change in IT job availability for the past three years along with salary data for key IT positions.

    January, 2002

  • Technology Trends - Public B2B Exchanges Must Look Toward the Future (Dec 2001)

    Public B2B Exchanges Must Look Toward the Future (Dec 2001)

    Impact from the soft economy was only one of the hits that public B2B exchanges took over the last six months. Not only have buyers grown more cautious as the economy has headed south, but also the tough business climate has made firms more competitive. Seeking an edge, many companies have been reluctant to accept terms from their suppliers that merely equal those of competitors. Lack of standards that streamline the supply chain are yet another weakness of these electronic marketplaces.

    December, 2001