Newsletters 2005

May 2, 2005

Identity Management: The Issues

Identity Management: The Issues by Robin Bloor, Partner We have been expecting to see consolidation in the Identity Management (ID Mgt) market and it is now happening at quite a pace. If you have been watching you will have noticed that IBM, Sun Microsystems, HP, CA and BMC have all acquired ID Mgt companies or […]

0 Comment
May 1, 2005

Streaming: The Emergence of a New Technology Trend

Streaming: The Emergence of a New Technology Trend by Robin Bloor, Partner New types of applications are suddenly emerging because of increased scalability and speed of everything from CPUs, memory, disk, and networks. This is in keeping with the evolution of technological changes over the last several decades. For example, when relational databases were first […]

0 Comment
April 25, 2005

The Customer Benefit of Implementing Data Integration Software

The Customer Benefit of Implementing Data Integration Software by Judith Hirwitz, CEO Over the past several years, CIO’s have focused on cutting back on spending and making their organizations more efficient. Companies that have been successful in adding efficiency and have benefited by economic growth, are now ready to take the next steps and move […]

0 Comment
April 20, 2005

Analyzing Business Analytics

Analyzing Business Analytics by Fern Halper and Marcia Kaufman, Partners Introduction Information and decision-making usually go hand in hand. Better quality information and better analytical tools generally lead to improvements in strategic decision making. We are only now starting to see a critical mass of companies effectively using analytical technologies that have been in existence […]

0 Comment
April 18, 2005

Whence the Next Generation?

Whence the Next Generation? by Carol Baroudi, Partner In the long-term game of “Conquer the World Market,” intelligent vendors, seeking to train or indoctrinate future generations, have been supplying schools with IT equipment and software for free or at deep discounts for decades. Hardware vendors know by now that they can’t sell hardware without software […]

0 Comment
March 29, 2005

Open Source Unwrapped

Open Source Unwrapped by Judith Hurwitz, CEO One of the most important aspects of open source is its power and potential. Whenever the best minds in an industry join forces to create value, the potential is enormous. This has happened with space, cancer research, and the initial Internet itself. There are also political ramifications behind […]

0 Comment
March 23, 2005

Eclipse Foundation Evolves Open Source Framework

Eclipse Foundation Evolves Open Source Framework by Rikki Kirzner, Partner The Eclipse Foundation was formed in February 2004 when IBM placed its Eclipse Platform into open source. Since then Eclipse has evolved into an open source framework designed to give tool vendors and developers a platform on which they can build high value capabilities. The […]

0 Comment
March 22, 2005

ComBrio Changes the Rules

ComBrio Changes the Rules by Rikki Kirzner, Partner and Carol Baroudi, Partner The problem is ubiquitous and complex. The solutions are awkward, expensive and inadequate. Customer Service is well overdue for a revolution. We’ve just been trying to figure out how to make it happen. In a world where commoditization drives margins to bare minimum, […]

0 Comment
March 6, 2005

TeaLeaf Provides Visual Insight into Online Customer Experience

TeaLeaf Provides Visual Insight into Online Customer Experience TeaLeaf’s RealiTea raises the bar for detecting and analyzing customer experience. by Fern Halper, Partner and Marcia Kaufman, Partner Doing business online isn’t new; in fact it is a key channel for many companies. The reality is that today’s Internet users expect significantly better functionality than sufficed a few […]

0 Comment
March 1, 2005

The Attack On SHA1 And Its Implications

The Attack On SHA1 And Its Implications by Arnold Reinhold, Principal A team of researchers from Shandong University in China, Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu, has announced an attack on the cryptographic hash algorithm SHA1. This is big news in the cryptographic community, but what are the implications for computer security, the […]

0 Comment