CenterBeam
CBS Marketwatch, 2/18/03: CenterBeam Awarded SAS 70 Type I Certification
SANTA CLARA, Calif., Feb 18, 2003 /PRNewswire via COMTEX/ -- After an extensive examination conducted by Ernst & Young, CenterBeam has been awarded SAS 70 Type I certification. The SAS (Statement on Auditing Standards) 70 certification is an internationally-recognized standard developed by the American Institute of Certified Public Accountants. Ernst & Young's examination means that CenterBeam has implemented controls that are suitably designed to achieve the specified control objectives and activities and that CenterBeam's services are delivered -- per their service level agreements.
Certification Shows CenterBeam's Focus On Values
"CenterBeam is built on a foundation of values and two of our most important values are Integrity and Customer First. Earning a SAS 70 Type 1 certification shows CenterBeam acting on both of these values," said Keith Roberts, CenterBeam chief financial officer and leader of the CenterBeam SAS 70 certification team. "First, it means that CenterBeam has integrity and delivers exactly what it promises -- from how CenterBeam runs its world-class network operation center to how we lock our doors. Second, winning the certification points to CenterBeam's 'Customer First' focus. Many of our clients require their partners to have SAS 70 certification. If it's important to our clients, it's important to CenterBeam."
About CenterBeam, Inc.
CenterBeam manages end-user information technology for organizations interested in saving costs, raising productivity and increasing corporate agility. Founded in 1999, CenterBeam has strategic, financial and technical backing from industry leaders Microsoft, Intel, Dell and EDS. The company is headquartered in Santa Clara, CA and can be reached at 408.844.0900 or www.centerbeam.com.
Announcement also appears in the following media:
Dallas Morning News [here]
Finance Canada [here]
Lycos [here]
Miami Today [here]
Morningstar [here]
NewsAlert [here]
Silicon Valley Business Ink [here]
WCNC-TV (NBC) Charlotte, NC [here]
Yahoo [here]
The Eagle: Brazos, Texas [here]
Auto-Rebirthing
Computerworld, 2/17/03: BIOS maker builds PC 'bomb shelter'
By Stephen Lawson, IDG News Service
Users with crashed PCs may be able to press a "panic button" and bring up a set of recovery and other utilities if vendors start including a new data "bomb shelter" on the hard disk drives of their PCs.
Phoenix Technologies Ltd., which makes the BIOS that runs at boot-up on many current Windows PCs, will sell its Phoenix Core Managed Environment (CME) software to PC vendors along with technology for putting it on the least-used part of the hard drive, around the spindle at the center, said Bob Gager, senior director of product marketing at Phoenix, in San Jose. A version will also be available for servers, along with versions for embedded devices and information appliances such as TV set-top boxes, where software may be stored in another safe location.
[more]
IT Management
Giga, 2/10/03: Vendors and CIOs Can Work Together If They Focus on Value
Erin Kinikin
How can I sell better to CIOs? What are the key areas to consider?
CIOs value vendor relationships as a key source of information about what the rest of the industry is doing,how to save money and improve results, and sometimes even professional development. However, CIOs have very little time or ability to sift through vendor marketing and understand whats important or useful. With a continued focus in 2003 on cost reduction and doing more with less, the successful high tech companies will be those who can clearly demonstrate the near-term value of their solutions in the context of the infrastructure and people investment businesses have already made.
[more]
Giga, 2/13/03: Best Practices and Common Mistakes in Creating the IT Strategic Plan
Marc Cecere
Developing an IT strategic plan is difficult but should not be a mystery. After reviewing hundreds of strategic plans and assisting in the creation of many, Giga has determined that there are a number of common elements in good strategic plans as well as common mistakes in poor ones. Good plans explicitly link IT projects to the direction of the business. Good plans:
= Are persuasive and are presold to senior management
= Use objective methods for evaluating investments in technology
= Consider such mundane issues as the ability to execute and the available resource base
= Exploit the planning process by using it to educate business management
= Define the structures and process required to maintain the plan
[more]
Business Process Outsourcing
Computerworld, 2/17/03: IBM and partners provide on-demand BPO services
By Juan Carlos Perez, IDG News Service
In what it sees as a growing strategy, IBM said today that it has linked up with a pair of partners to provide business process outsourcing services to two joint clients. In both instances, Armonk, N.Y.-based IBM will provide technology hosting, and its partners will provide business software and services.
"The partners bring specific expertise to the table, and IBM is always seeking to partner with best-of-breed companies to deliver" services integrated with IBM technologies, such as grid computing, said James Larkin, a spokesman for IBM's Global Services division.
[more]
Utility Computing
ZDNet, 2/14/03: Firms wait-and-see on utility computing
By Ed Frauenheim
Potential customerss for utility computing are wary of sharing information technology resources and worry about the financial viability of service providers, research firm IDC said Thursday.
In a survey of 34 corporations, IDC found that IBM and Hewlett-Packard were among the top choices for providing utility computing, a budding approach to hardware and software needs that treats information technology as a service much like electricity or water.
[more]
Mobile Computing
Giga, 2/13/03: Securing Mobile Devices in 2003
Ken Smiley
Is it getting any easier to secure mobile solutions? What should be secured first?
Securing mobile solutions and the platforms on which they are based still remains a significant problem for many organizations. The variety of mobile devices, operating systems, application software, carrier networks and wireless technology has made nearly all mobile solutions a complex pattern of trade-offs when security is concerned. More than a year ago Giga established a model for securing mobile solutions and has since continued to evaluate emerging vendor offerings against this model to spot significant trends.
[more]
10:37:45 AM
|