|
|
|
Wired & Wireless | | |
How important is this?
Wired & Wireless ranked as #1 IT priority in May
|
|
|
Hardware Upgrades | | |
How important is this?
Hardware Upgrades ranked as #2 IT priority in May
|
|
|
Harvesting Hardware Maintenance SavingsAlthough hardware price/performance continues its ride down the commodity curve, IT organization (ITO) maintenance budgets remain stubbornly high. Users focusing on lean maintenance management should realize significant savings against an often-ignored budget line item. A Best Practices Guide for IT Systems ProcurementThe May 2003 CIO Forum in New York City, managed by Richmond Events, brought together hundreds of top-tier CIOs, CTOs, and systems administrators for a series of seminars, workshops, and discussions. Following dozens of interviews, The Yankee Group assembled a set of best practices for systems licensing and negotiations.
Evaluating the Costs of Multivendor PC HardwareAlthough some level of diversity in hardware suppliers is typically unavoidable and beneficial, it does introduce costs that must be understood during the vendor selection process. This is particularly true for PCs and other end-user devices. Organizations should strive to keep the number of active vendors low. Estimating the Power of the GridVendors tout grid, utility, or on demand computing as if they were the underpinning of an IT revolution. However, the current reality remains decidedly less tantalizing. See all Hardware Upgrades articles
|
Software Infrastructure | | |
How important is this?
Software Infrastructure ranked as #3 IT priority in May
|
|
|
Security | | |
How important is this?
Security ranked as #4 IT priority in May
|
|
|
Why your personal firewall could be obsoleteWith Microsoft poised to transform Windows XP's built-in personal
firewall into a more serious security technology, now's a good
time for enterprises to think more strategically before buying
any more third-party personal firewall technology. But where's the outbound filtering?
Security from the inside outMost security solutions deal with attacks from the outside in,
building security perimeters across a network. Start-up Fortify
Software is pioneering an automated inside-out, root-cause approach
that could improve the security of software by systematically
weeding out vulnerabilities as an integral part of the software
development process. Business blind spots can have devastating consequencesThe constant chatter about insufficient budgets, technology complexity and regulatory compliance is valid, but it masks the underlying failure to inculcate a culture that can overcome those problems with a clear and strategic focus on identifying the key business levers and extracting the relevant data.
Security issues move Linksys routers off the short listDavid Berlind's's Linksys router/firewalls--old and new--have suffered a variety of Universal Plug-n-Play problems, port vulnerabilities and reliability issues. Apparently, a combination of engineering difficulties and design decisions are leaving Linksys customers exposed to potential security problems. See all Security articles
|
Web Technology | | |
How important is this?
Web Technology ranked as #5 IT priority in May
|
|
|
Googlemania and the enterpriseGiven how Google has evolved since it first opened
its doors nearly six years ago, the IT community can expect the company to
become a major, global infrastructure player. In fact, Google
may become as relevant within enterprises in the future as
Microsoft or Cisco are today. The CA and the FuryCA announced Wednesday the resignation of Sanjay Kumar as CEO and chairman of the board of Computer Associates. In the same announcement, Kumar was appointed to the newly created position of chief software architect. Is IronPort's SMTPi the cure to unwanted e-mail?We're not going to stop spam until the various providers of e-mail
solutions and services agree to new interoperable e-mail standards.
To address the authentication issues, Microsoft and Yahoo are
advocating their proprietary technologies, while a third, caller-ID-like
spec known as Sender Policy Framework is proving why open may be the
way to go. But what about accreditation? Enter SMTPi, a unique and
promising if misleadingly named solution. See all Web Technology articles
|
|
|
|
|