Monthly Archives: August 2003
Can the CIO Be An Endangered Species?
The code-writing is on the screen.Development of software is shifting to India, China and the Philippines.Deployment also is moving out. PeopleSoft has announced the...
Will Java Roast on An Open Fire?
The way Suns Java programming language has been developed is something of a paradox. Sun owns the core code behind Java, which is used...
Keep Wireless Clients on Their Own Network Zone
The new SonicWall SOHO TZW ($900 street) is a complete security appliance for small networks, be they wired, wireless, or both. Its easy setup...
Fishing for Assets
Financial advisers at the Merrill Lynch office in San Jose, Calif., cringe just before 1 p.m. local time, and it has nothing to do...
The Cost of Complying With Sarbanes-Oxley
Did you know that:The process never endsBringing your systems into compliance with a new financial reporting law may be your biggest information-technology expenditure this...
Auditing An Oracle
Shareholders nearly deify Warren Buffett for the way he manages his diverse holding company, Berkshire Hathaway of Omaha. Theres little doubt that hes squeaky...
How to Improve Your IT Security Policy: A Six Sigma Approach – 2
You have a security policy. but is it effective? For many companies, chances are the answer is no; more likely, it is slowing down...
Top Tip: Poor wireless reception!
Tips used for Top Tips come from the ExtremeTech forum and are written by our community.Question from Johdel "I have had poor results gettering...
Can the Redmond Leopard Change Its Spots?
Weve come a long way from the days when top Microsoft brass called Linux "un-American" and a "cancer." Or have we?Microsofts new point man...
Security Web Digest: Proposed Spyware Bill Requires Permission From Users
Privacy
Rep. Mary Bono introduced a bill this week that would take the "spy" out of spyware. The Safeguard Against Privacy Invasions Act would require...