Outsourcing
Dow Jones News Service, 9/15/04: JPMorgan Chase And IBM Announce Changes To Technology Infrastructure
NEW YORK -- JPMorgan Chase & Co. (JPM) plans to reintegrate the previously outsourced portions of its technology infrastructure from International Business Machines Corp. (IBM ).
The infrastructure, which was fully outsourced to IBM in April 2003, includes data centers, help desks, distributed computing, data networks and voice networks.
In a press release Wednesday, JPMorgan Chase said beginning in January, the about 4,000 IBM employees and contractors supporting JPMorgan Chase accounts will be transferred back to the company.
[more]
IT Management
Internetnews.com, 9/15/04: Detect and Block IM — for Free
By Dan Muse
Businesses that think their employees aren't using IM or some type of peer-to-peer file sharing application may be living in ignorant bliss. In fact, market research firm The Radicati Group reports that 80 percent of enterprises have employees using IM or P2P software. However, only 15 percent have taken steps to secure and manage those applications.
Enter IMlogic, a Waltham, Mass.-based IM management software provider. The company today announced IM Detector Pro, free downloadable software designed to detect and block unmanaged IM, P2P and VoIP activity.
[more]
Secuity
Computerworld 9/15/04: Reclaim the 'Net, says former cybersecurity czar
News Story by David Watson
SEPTEMBER 14, 2004 - AUCKLAND, New Zealand (Computerworld New Zealand) - It's time to take back cyberspace from hackers, phishers and others who are preventing e-commerce and e-government from reaching their full potential.
That was the message Richard A. Clarke, former special adviser to President George Bush on cybersecurity, gave at a CIO breakfast meeting in Auckland recently.
[more]
C|net, 9/15/04: Major graphics flaw threatens Windows PCs
By Robert Lemos
Microsoft published on Tuesday a patch for a major security flaw in its software's handling of the JPEG graphics format and urged customers to use a new tool to locate the many applications that are vulnerable.
The critical flaw has to do with how Microsoft's operating systems and other software process the widely used JPEG image format and could let attackers create an image file that would run a malicious program on a victim's computer as soon as the file is viewed. Because the software giant's Internet Explorer browser is vulnerable, Windows users could fall prey to an attack just by visiting a Web site that has affected images.
[more]
8:45:01 AM
|