• Grid View
  • List View
  • Technology Trends - Network Cable Installation and Material Costs

    Network Cable Installation and Material Costs

    This report shows the current hourly rates in U.S. dollars for cable technicians. It also lists the typical cost in U.S. dollars of cable installation materials.

    March, 2002

  • IT Best Practices - IT Accounting and Chargeback Systems

    IT Accounting and Chargeback Systems

    IT accounting and chargeback systems are integral for tracking IT resources. Computer Economics has researched and summarized IT accounting and chargeback systems of five major players in the cost accounting software space.

    March, 2002

  • IT Spending Benchmarks - Costs for Instructor-Lead Training

    Costs for Instructor-Lead Training

    We reviewed programs offered by several commercial training companies to determine costs (low and high) for several software packages and programming languages. Figure 1 provides the level of training, number of days, and low and high costs of training for each software package.

    March, 2002

  • Technology Trends - E-Business Challenges: Corporate Perspective

    E-Business Challenges: Corporate Perspective

    As organizations maneuver their way through e-business projects, many issues are still unclear. Companies continue to struggle with implementing the most cost-effective technologies, automating business functions, and creating a unified e-business effort throughout the organization. Most importantly, less than half of over 500 organizations in a recent Computer Economics survey are earning a positive return on investment for their e-business projects.

    March, 2002

  • Technology Trends - Planning for Wireless Data Communications

    Planning for Wireless Data Communications

    As wireless data communications becomes a reality in today's ever-shrinking world of business and commerce, enterprises should evaluate the technology and begin formulating a plan for adoption. Wireless data solutions are a vital facet of remote access technology for companies with an increasing number of mobile or remote employees. Enterprises have the opportunity to deliver high-speed voice, video, and data traffic to employees carrying personal communications services (PCS) systems at their side.

    March, 2002

  • IT Best Practices - Hot Site Fees for Disaster Recovery

    Hot Site Fees for Disaster Recovery

    This report shows hot site disaster recovery charges according to platform type. The monthly fee column represents the charge that the consumer of hot site services must pay per month to assure that the services are available when needed. The declaration charges column represents the amount of money that a consumer must pay to begin receiving hot site services when the disaster occurs, and the final, daily usage charges column represents the amount of money that the disaster-stricken consumer must pay during each day that the hot site is used. Prices are shown in U.S. dollars.

    March, 2002

  • IT Best Practices - Web Procurement Provides Major Operational and Maintenance Savings

    Web Procurement Provides Major Operational and Maintenance Savings

    Many organizations know that their paper-based procurement systems are expensive and inefficient, but too few realize that online procurement is a practical alternative. In particular, many small- to medium-size businesses fail to comprehend that cost-effective e-procurement for them is a reality today. This is not to say that IT managers should recommend that their organizations jump blindly into placing orders on the Web, but rather that a good plan will likely lead to a much improved procurement system. These improvements will not only cut costs but the quicker responses also will satisfy users.

    March, 2002

  • IT Best Practices - Financial Impact and Background Information on Distributed Denial of Service Attacks

    Financial Impact and Background Information on Distributed Denial of Service Attacks

    In early February 2000, seven top e-commerce websites in the private sector were attacked by distributed denial of service (DDoS) intrusions, resulting in a $10.6 million loss in unrealized revenues from sales and advertising. From our analysis of Securities and Exchange Commission (SEC) filings and Media Metrix data, we estimate that in a reporting quarter, there are 75 high-volume days. We estimate that DDoS attacks cost the e-commerce sites 24 hours worth of high-volume revenues.

    March, 2002

  • Technology Trends - Many Vendors Boost Linux Enterprise Capabilities

    Many Vendors Boost Linux Enterprise Capabilities

    Many IT managers still view Linux as an operating system favored by game playing geeks with no place in mission critical applications that demand 24x7 reliability. But the many advantages that Linux is beginning to demonstrate in just such applications is reason to look into where this technology might fit into your organization's infrastructure.

    March, 2002

  • IT Best Practices - How to Report Internet and Computer-Related Crimes (Jul 2000)

    How to Report Internet and Computer-Related Crimes (Jul 2000)

    Internet and computer-related crimes should be reported to appropriate law enforcement investigative authorities at the local, state, federal, or international level.

    March, 2002

  • Technology Trends - Globalstar Expands Mobile Satellite Services (Sep 2000)

    Globalstar Expands Mobile Satellite Services (Sep 2000)

    In February 2000, Globalstar USA launched its mobile satellite service in the United States, providing seamless voice service coast to coast with international roaming capabilities. A rollout of commercial Globalstar services began at the end of 1999, and it is anticipated that completion of the basic network rollout will be achieved by the first quarter of 2001, at which point Globalstar service will be available in over 120 countries served by 38 gateways.

    March, 2002

  • Technology Trends - Compaq Software and Hardware Highlights for 2000 (Aug 2000)

    Compaq Software and Hardware Highlights for 2000 (Aug 2000)

    In June 2000 Compaq presented a strategy statement for OpenVMS. Central to the strategy is the release of new OpenVMS functionality every 12 to 18 months, support for all AlphaServers, and the integration of solutions with Windows NT, Tru64 UNIX, and StorageWorks. In addition Compaq pledged to enhance ultra high availability, scalability, security, and performance including support for Fastpath for SCSI and Fibre Channel, reduction in RMS locking, lock manager performance enhancements, and Extended File Cache (XFC).

    March, 2002

  • Technology Trends - IBM Fights to Recover PC Server Market Losses

    IBM Fights to Recover PC Server Market Losses

    The drop in IBM's server revenues by more than 10 percent during 1999 caused CEO Lou Gerstner to name Samuel Palmisano to head a new server business entity. Palmisano is viewed by many as a likely successor to Gerstner, so this move signifies how serious IBM is about battling to regain its lost market share. IBM is in third position in the server market and is challenged by Compaq, Dell, and Hewlett-Packard. IBM is revitalizing every aspect of its server business in order to turn the situation around.

    March, 2002

  • Technology Trends - DSL Can Payoff in Enterprise Applications

    DSL Can Payoff in Enterprise Applications

    Digital subscriber line (DSL) is the phone company's answer to low cost, wide bandwidth communications channels. Challenging DSL are the cable companies, which offer cable modems. From a business standpoint, the matter certainly tilts in favor of DSL, although few companies have yet taken the plunge. This analysis looks at the issues that confront an IT manager considering DSL installations and what tradeoffs need to be addressed.

    March, 2002

  • IT Best Practices - Biometric Security Moves Into the Real World

    Biometric Security Moves Into the Real World

    No system administrator wants to admit the vulnerability of IT systems protected merely by passwords. The need to protect valuable, proprietary information systems against unauthorized access is encouraging a number of organizations to introduce biometric security measures. This short report outlines six types of biometric security systems. (3 pp, 2 figs.)

    March, 2002