Newsletters 2005

August 30, 2005

Why Is IT Security Such A Big Problem?

Why Is IT Security Such A Big Problem? by Robin Bloor, Partner   One cannot help but look at the wide array of IT security technology and wonder. There?s antivirus software, anti-spyware, firewalls, VPNs, encryption technology, biometrics, email filtering, intrusion detection, data audit and quite a lot more. Indeed there is a vast array of […]

0 Comment
August 24, 2005

How To Dismantle An Atom Bomb?

How To Dismantle An Atom Bomb? by Robin Bloor, Partner, and Fran Howarth, Principal   Once upon a time, software developers didn?t need to worry about security. They wrote applications that were implemented on secure computers, and that was that. The realm of application software was locked up tight. End of story. But along came […]

0 Comment
August 24, 2005

What is BSM, Anyway?

What is BSM, Anyway? By Fern Halper and Marcia Kaufman, Partners There is a fundamental shift occurring in the way businesses view, comprehend, and map their IT resources to their business goals. Many IT executives are beginning to reorient the way they monitor and optimize their IT resources in a way that speaks directly to […]

0 Comment
August 24, 2005

New Search Technology Advances

New Search Technology Advances: The Mining of the Invisible Web  by Rikki Kirzner, Partner Yahoo, Google, and other major search engine companies have estimated there are between 8 and 20 billion documents on the Web.  It isn’t so. The truth is that the Web is home to more than 500 billion Web based documents that […]

0 Comment
August 16, 2005

The JavaOne Conference: Is Sun Becoming Irrelevant to the Future of Java?

The JavaOne Conference: Is Sun Becoming Irrelevant to the Future of Java? By Rikki Kirzner This year’s tenth annual JavaOne conference in San Francisco unveiled a very impressive showcase of innovative technologies and solutions from a great number of vendors – vendors who largely discounted many of Sun’s announcements along with its half-hearted move toward […]

0 Comment
August 16, 2005

Basel II Compliance: Another Burden for European CSOs?

Basel II Compliance: Another Burden for European CSOs? By Fran Howarth The Basel II capital adequacy framework is a regulatory tool that is designed to help mitigate the risk that haunts financial institutions. Its designers had a clear purpose in mind: to create safer and sounder financial institutions by mandating that the amount of capital […]

0 Comment
August 16, 2005

Data Quality Evolves

Data Quality Evolves By Fern Halper and Marcia Kaufman Data quality is an integral part of any company’s information infrastructure and poor data quality, therefore, impairs the organization in a number of ways. Poor data quality affects operational efficiencies, decision making, and reporting – to name only a few of the more obvious targets. And, […]

0 Comment
August 16, 2005

The Future of Email

The Future of Email  By Robin Bloor Microsoft’s recent acquisition of FrontBridge Technologies will provide a much needed functionality boost to Microsoft Exchange. A minor surprise in this is that the functionality FrontBridge delivers was already on the Exchange roadmap. Microsoft has decided to buy rather than continue to build, probably for the sake of […]

0 Comment
June 28, 2005

Security, Privacy, Accountablilty – Let the Party Begin

Security, Privacy, Accountability – Let the Party Begin   by Carol Baroudi & Robin Bloor   Headline: CardSystems Solutions Exposes 40 Million Credit Cards to Security Risk.   Headline: BJ’s Wholesale Club Settles FTC Charges of Creating Unnecessary Risk and Failure to Use Available Security Measures.   The emperor has no clothes. Again. The sad – […]

0 Comment