Newsletters 2005

October 28, 2005

SOA: Battle of the Titans

SOA: Battle of the Titans by Judith Hurwitz, CEO It is indeed an interesting time in enterprise software.  Suddenly, the major enterprise vendors are all deciding that they will own SOA and make it the foundation of their own development and partner ecosystem.  In addition, each vendor hopes to win the hearts and minds of […]

0 Comment
October 28, 2005

Time to Banish WEP

Time to Banish WEP by Arnold Reinhold, Principal  It is time to banish WEP from the face of the Earth. WEP (Wired Equivalent Privacy) was the first generation security layer for WiFi (802.11) wireless networks. It had the modest goal of providing the same level of security users enjoyed when plugged into an ordinary Ethernet […]

0 Comment
October 28, 2005

20 Second Protection – From Cloudmark

20 Second Protection – From Cloudmark by Carol Baroudi and Robin Bloor, Partners We have not canned the spam. We have not caught the phish. We cannot prevent viruses as much as we wish. Enough already. Spam filters, virus protection, spoof proofing. We do everything we?re supposed to do and the issues don?t go away. […]

0 Comment
September 30, 2005

After The Hurricane

After The Hurricane by Rikki Kirzner, Partner    Our thoughts and prayers go out to those people and their families who were adversely affected by the trail of death and destruction wreaked by Hurricane Katrina and the less destructive Hurricane Rita that followed in its wake. The Economic Impact Certainly, Katrina will negatively impact the […]

0 Comment
September 28, 2005

Why the Registry Matters to SOA

by Judith Hurwitz, CEO & Marcia Kaufman, Partner We have spent a good deal of time talking to CIOs about their implementation of Service Oriented Architectures.  It is clear that companies which are looking at SOA from a business perspective rather than purely a technical perspective are in a much better position to be successful.  […]

0 Comment
September 26, 2005

The Abuse of IT Resources

The Abuse of IT Resources by Robin Bloor, Partner Wondering why its broadband link was saturated, a company bought and installed a network monitoring appliance and discovered that one of its 60 or so PC users was consuming 40 percent of the company?s bandwidth. Her PC was examined to see why and at first, no-one […]

0 Comment
September 26, 2005

Closing The Vulnerability Gap

Closing the Vulnerability Gap by Carol Baroudi, Partner BlueLane Patches The Patch Problem  A vulnerability is announced. The clock begins to tick. The race is on. It?s the bad guys versus the good guys, and the bad guys have a head start. The scenario is all too familiar and it happens every few weeks. Major […]

0 Comment
September 26, 2005

Oracle: the Company with the Midas Touch?

Oracle: the Company with the Midas Touch? by Fran Howarth, Principal Where isn?t Oracle going? Those who have long complained about Oracle?s lock-in strategy had better wise up. It has always been known as a database company, and selling databases still provides 80% of its revenues. But, at present, Oracle appears to be embarking on […]

0 Comment
August 31, 2005

Identity Management: Today?s Business Imperative

Identity Management: Today?s Business Imperative by Fran Howarth, Principal Trust is of fundamental importance for business. We need to trust our employees, suppliers, partners and customers in such matters as credit, non-disclosure of privileged information and compliance with corporate policies. In order to achieve that trust, it is vital that the identity of all partners […]

0 Comment
August 31, 2005

SOA – Towards The Industrialization Of Software

SOA ? Towards The Industrialization Of Software by Judith Hurwitz, CEO Maybe I have been around too long but I am suddenly sensing that we are entering a familiar pattern?vendors and customers focused on an emerging technology approach without being prepared for the right action for success.  Everywhere there is talk about Service Oriented Architecture […]

0 Comment