Reports

Showing 3745–3760 of 3794 results

  • IT Best Practices - Biometric Technologies for Computer Security

    Biometric Technologies for Computer Security

    Biometric technology has been applied to IT security for several years, adoption has been slow, and some applications are starting to become a reality, including fingerprint scanning, facial recognition, and voice verification. Nevertheless, the jury is still out as to how viable these technologies will be for widespread use in corporate IT environments.

    February, 2002

  • IT Best Practices - Computer Losses in 1998 and 1999

    Computer Losses in 1998 and 1999

    This article provides data concerning desktop and notebook (laptop) losses during 1998 and 1999, based on information provided by Safeware Insurance. Data provided includes number of incidents and value of loss, by cause. Causes include accidents, theft, power surge, lightning, transit, water/flood, and other.

    February, 2002

  • Technology Trends - Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    Guarding the Gate Is Essential for E-Commerce: The Case for Firewalls (Aug 2000)

    The ever-expanding Internet creates new opportunities for hackers to disrupt e-commerce daily. Network firewalls can do much to make your e-commerce site less attractive to hackers, though even the best guard dog cannot entirely overwhelm attempts to penetrate your security. This article provides recommendations for evaluating various approaches to firewall technology.

    February, 2002

  • Valuations - Top Ten Steps for Disposing of Obsolete Computer Equipment

    Top Ten Steps for Disposing of Obsolete Computer Equipment

    As the glut of high-tech junk accumulates, businesses are facing increasing pressure to properly dispose of obsolete computer hardware. In addition to compromising the environment, improper disposal of obsolete computer hardware can result in leakage of proprietary company information and violation of new federal privacy laws that ban the disclosure of non-public financial and medical information about employees and customers.  This article provides a checklist of questions to simplify the process of electronics disposal and comply with new federal privacy regulations. (3 pp.)

    February, 2002

  • Technology Trends - What Lies in the Future for the Mainframe Market?

    What Lies in the Future for the Mainframe Market?

    Mainframes are widely used to satisfy e-commerce, customer relationship management, ERP, and server consolidation requirements, but recent events presage major changes in past big iron trends. This report outlines the decline in mainframe installations and cost-per-MIPS for the period 1998-2003.

    February, 2002

  • IT Best Practices - Build a Security Conscious Organization

    Build a Security Conscious Organization

    Based on Computer Economics projections, computer crime will grow by an estimated 230 percent during 2001. Similar trends are expected with Internet fraud. All IT managers would agree that securing their IT resources is a necessity, but many are not willing to commit to the continual effort required.

    February, 2002

  • IT Best Practices - eXtreme Programming Opens New Possibilities (Feb 2002)

    eXtreme Programming Opens New Possibilities (Feb 2002)

    The only certainties in software development are that the application will arrive late, cost more than expected, and fail to meet all of its functional requirements. Based on numerous evaluations conducted by Computer Economics, more than 90 percent of large-scale software applications fail to meet at least one of these goals, and about half of all developmental efforts are abandoned without delivering any useful product. The ever-growing demand for new software, along with increasing complexity of the applications, will only exacerbate the situation.

    February, 2002

  • Technology Trends - Peer-to-Peer Continues to Build Enterprise Capabilities (Feb 2002)

    Peer-to-Peer Continues to Build Enterprise Capabilities (Feb 2002)

    Peer-to-peer (P2P) computing, which has received most of its media attention from noncommercial Internet applications, is appearing in viable enterprise applications and gaining maturity through widely supported industry working groups. P2P, in its most basic form, is a decentralized computer network that communicates without the need for a dedicated server.

    February, 2002

  • IT Best Practices - The Limited Personal Use of IT Resources

    The Limited Personal Use of IT Resources

    The United States federal government has been working to develop a balanced perspective and policy toward the personal use of government-owned information technology and services by government employees. This personal use must not result in loss of employee productivity or interfere with official duties. Moreover, such use must result in only minimal additional expense to the government

    February, 2002

  • IT Best Practices - Privacy Remains an Issue Among Consumers  (Jan 2002)

    Privacy Remains an Issue Among Consumers (Jan 2002)

    Thirty-five percent of consumers say they are more concerned about their financial privacy than they were a year ago, according to a survey released by Star Systems, a Concord EFS subsidiary. The other 65 percent, however, report either the same level (59 percent) or a lower level (6 percent) of concern. And 61 percent of respondents are satisfied with the way their primary financial institution has informed them of its privacy policies.

    January, 2002

  • Technology Trends - How to Make CRM Financially Viable

    How to Make CRM Financially Viable

    The purpose of customer relationship management (CRM) is to provide a dialog between your customers and your business. This goal implies that an organization should commit itself to major internal changes because the key to successful CRM implementation is not limited to IT issues. Rather, success depends on interdepartmental cooperation and superb leadership. The main reason that many firms have failed in their CRM deployments revolves around failing to grasp these concepts.

    January, 2002

  • IT Salaries - IT Labor Market in 2002

    IT Labor Market in 2002

    Many IT professionals are looking for a job these days. Those who have been laid off are searching for new opportunities, while those still employed are worried about the stability of their current positions. This report analyzes trends in the IT job market by analyzing annual percentage change in IT job availability for the past three years along with salary data for key IT positions.

    January, 2002

  • Technology Trends - Public B2B Exchanges Must Look Toward the Future (Dec 2001)

    Public B2B Exchanges Must Look Toward the Future (Dec 2001)

    Impact from the soft economy was only one of the hits that public B2B exchanges took over the last six months. Not only have buyers grown more cautious as the economy has headed south, but also the tough business climate has made firms more competitive. Seeking an edge, many companies have been reluctant to accept terms from their suppliers that merely equal those of competitors. Lack of standards that streamline the supply chain are yet another weakness of these electronic marketplaces.

    December, 2001

  • IT Best Practices - What Copy Protection Means to E-Commerce (Nov 2001)

    What Copy Protection Means to E-Commerce (Nov 2001)

    Intellectual property owners are eager to prevent a repeat of the lack of copy protection on CDs and CD-ROMs. When record companies launched the CD over 20 years ago, they decided not to encrypt it. That decision simplifies copying or pirating any information recorded in CD format. Now a variety of schemes are being proposed to protect information on the Internet and new media formats such as DVDs. The question of whether these protection methods will be viable and what they offer content producers has complex answers.

    November, 2001

  • IT Best Practices - Review Your System Security Now

    Review Your System Security Now

    The probability that any computer system will become the victim of a security attack is growing exponentially. Recent experience with the Code Red worm, for example, showed that over half a million hosts were infected and that it cost over $1 billion to remediate infected systems. Our research indicates the trend will continue toward increasing security threats.

    November, 2001

  • Technology Trends - Microsoft Shifts Strategy

    Microsoft Shifts Strategy

    Microsoft's corporate direction is in flux. The government's pending antitrust lawsuit remains a major factor in determining the company's future actions. The U.S. Court of Appeals affirmed that Microsoft was guilty of illegal anticompetitive tactics, but the court reversed the breakup order and further held that bundling of software was not necessarily monopolistic. This article analyzes the possible impact.

    September, 2001