CenterBeam News Log
News You Can Use




Subscribe to "CenterBeam News Log" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Thursday, August 22, 2002
 

CenterBeam

Coverage of Tarari / CenterBeam Press Release

c|net, 8/21/02

[more]

NewsAlert, 8/21/02

[more]

Briefing.com, 8/21/02

[more]

Outsourcing

TechWeb, 8/21/02:  Outsourcing Fastest-Growing Segment Of HP's Services

Aaron Ricadela, InformationWeek

Hewlett-Packard's outsourcing business is the fastest-growing component of its roughly $20 billion IT services, executive VP Ann Livermore says. But the company's consulting and integration business, which contributes about a quarter of services revenue, likely won't recover until "CIOs spend on new projects," she says.

[more]

Infoworld, 8/21/02:  Yankee: CIOs grapple with outsourcing complexity

Juan Carlos Perez, IDG News Service, Latin America Bureau

As companies restructure and change strategies to cope with the economic downturn, chief information officers (CIOs) must accordingly modify IT outsourcing engagements, a complex process, according to Yankee Group.

"Businesses in general, due to the economy, are facing severe pressures, and so are turning more towards outsourcing in all of its flavors for help," said Andy Efstathiou, a Yankee Group analyst, adding that spending in outsourcing is growing at an 11 percent to 12 percent rate compared with last year, and outpacing spending in other IT services such as systems integration and consulting.

[more]

HelpDesk

The New York Times, 8/22/02:  Support Has Its Price

By ROGIER VAN BAKEL

For 14 years, computer users who bought software by Dantz, a manufacturer of backup programs, received unlimited free technical support by phone or by e-mail. No longer. Earlier this year, Dantz began restricting its free assistance to just 30 days after purchase. Customers who buy an upgrade of a Dantz program get no free help at all. Depending on the product, both types of customers will have to pay either $39.95 or $69.95 per incident to talk to someone who can help solve their problem.

[more]

EDS

eWeek, 8/21/02:  ABN Amro Narrows Down Outsourcing Field

By  Paula Musich

Dutch banking behemoth ABN Amro Bank N.V. narrowed down its list of possible outsourcers to EDS for its Wholesale Client banking unit.

Although the two firms don't expect to complete contract negotiations until the fourth quarter, EDS is the sole contender to supply IT services, worth at least $1.5 billion, although that figure could go higher, some industry observers believe.

[more]

IT Management

Giga, 8/19/02:  IT Service Management: More Educational Than Operational

IT service management (ITSM) is a 1992 initiative of the Computing and Telecommunication Ministry of Great Britain. Its goal is to advance IT best practices in service delivery and service support. The essence is contained in the IT Infrastructure Library (ITIL), a set of books describing the different processes. One problem with such initiatives is that their shelf life is usually as short as the technologies that support them, at the concept or at the implementation level. Many of these, like Common Management Information Protocol (CMIP), never came close to the impact anticipated.

[more]

Giga, 8/19/02:  Best Practices in Implementing Infrastructure Service-Level Management

Service-level management (SLM) is one of the most misused aspects of infrastructure management. Since all the functions within IT operations are aimed, directly or indirectly, at providing the best possible service at the lowest possible cost, one can argue that, in fact, all infrastructure management disciplines are part of the management of service levels. IT service management (ITSM) is a collection of all the best practices that contribute to the building and management of IT services. In this context, infrastructure SLM should be considered the management of the results achieved by the ITSM processes: It provides the verification that what is delivered conforms to user expectations and identifies the areas to be improved for better service.

[more]

Giga, 8/20/02:  Enabling Business Value Via IT — Expanding From Justification to Full Value Management

While most companies have taken an important first step in maximizing IT-enabled business value by developing business cases for major IT investments, the vast majority have yet to follow through with the critical next step of ensuring that value is achieved by measuring and optimizing business metrics after deployment. Research shows that a mere 20 percent of companies have programs in place to measure actual value gained from projects, and most of these programs only passively measure results rather than actively seeking to improve them. Current evidence indicates that this will increase to no more than 30 percent during the next 18 months, which frankly is not fast enough.

[more]

Security

Giga, 8/20/02:  Creating a Security Architecture: Introduction

Imagine how ineffective a security operation might be if staff spent most of their time chasing technical vulnerabilities with technical fixes, or if no one knows how or when to upgrade patches on operating systems and firewalls? Left to their own devices, IT security staff will overengineer security, attempting to plug every hole to the extent of their budget and abilities, regardless of whether that hole represents a measurable threat to the business. But this is exactly how most organizations operate their internal security practice.

[more]

Giga, 8/20/02:  Three Steps to Securing Mobile Platforms

Mobile platforms continue to represent one of the most severe and often overlooked security threats to the enterprise. Valuable and often highly sensitive information is carried beyond the physical confines of the enterprise aboard an ever-growing population of personal digital assistants (PDAs), cellular phones and other mobile devices. Strong security practices for personal computers and laptops are rarely transitioned and implemented on these new mobile platforms, leaving organizations exposed to an increasing risk of a major security breach. Predicting where and when a mobile platform will be compromised is highly speculative at best, but most security experts agree that attacks on mobile platforms will increase in the next few years.

[more]


7:27:01 AM    


Click here to visit the Radio UserLand website. © Copyright 2005 Brian D. Johnson.
Last update: 4/20/2005; 2:43:25 PM.
This theme is based on the SoundWaves (blue) Manila theme.
August 2002
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Jul   Sep