eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.
Informatica is attempting to put data mining information into end users hands more quickly. To do so, it has upgraded its business analytics applications and produced the Informatica Analytic Delivery Server for sending results to desktops, wireless devices and even voice recognition systems. In an announcement at its San Francisco user group meeting yesterday, Informatica […]
The American medical system would be better able to respond to bioterrorism threats like anthrax if the nations hospitals, doctors and epidemiologists were connected via the Web, according to the eHealth Initiative, a newly formed consortium of health care IT companies. High-speed Web connections would allow medical providers to share information about symptoms, outbreaks, treatment […]
Intel Corp. on Tuesday announced it has started sampling an updated version of its flash memory chip thats only half the size of its predecessor and consumes less energy, making it more ideally suited for cell phones and handheld digital devices. Intel contends the new chip, now being shipped to manufacturers for testing, will be […]
ORLANDO, Fla.—Application developers need to do a better job of considering enterprise storage needs. At least, thats the word from a top executive at Computer Associates International Inc. President and CEO Sanjay Kumar also said Tuesday that storage needs to be accessible from anywhere, easy to manage, always available and housed only on high-throughput devices. […]
Prudential financial spent nearly $10 million redesigning its web site, but the company isnt expecting a hard-dollar return on the investment. That might seem strange in these troubled times, but its an indication of just how integrated Web assets have become in Prudentials overall corporate strategy. “We felt we should reorganize the site and provide […]
1. Identify and locate your assets. Assess the importance of both information and material goods. Example: A computer may cost $3,000 to replace. The information on that computer might cost $60,000 to replace. 2. Perform a threat risk assessment. Categorize the likelihood of assets being stolen and the resulting damage. So, if a company has […]
LEADERSHIP IN DISASTER RECOVERY MANAGEMENTFirst Place: Rudolph Giuliani, Mayor of New York City B2B E-COMMERCEFirst Place: Prudential U.S. Consumer Group B2C E-COMMERCEFirst Place: Corcoran.com—The Corcoran GroupHonorable Mention: Barnes and Noble University for BarnesandNobleUniversity.com BUSINESS PROCESS IMPROVEMENTFirst Place: Ryder and eCredit ENTERPRISE MANAGEMENTFirst Place: United States Census Bureau, Computer Services Division, Bowie Computer Center HELP DESKFirst […]
The steady swarm of bugs, worms and other gremlins that plague desktop PCs has caused some companies to wave the white flag – and move to locked-down server-based computing systems that are less susceptible to such problems. The history of the PC in the corporation is a tale of chaos versus control. The industrys vendors, […]
Securing the Internet infrastructure that underpins corporate America has taken on a new urgency – some even call it a panic – as the nation moves deeper into its war on terrorism. Professionals in both information protection and traditional security say the sudden rush to find solutions underscores a change in a long-held attitude – […]
In the wake of September 11, were hearing about the benefits of outsourcing everything from software development, training and help desks and e-mail, to Web hosting and network management. On the surface, the argument for making these moves during these troubled times is pretty straightforward: “Outsourcing enables organizations to back up critical information at multiple […]