Jack E. Gold

About

Jack Gold is an industry analyst covering emerging technology. He is the principal analyst & founder at J. Gold Associates.

PCs to Carry Side-ARMs: How ARM Will Impact PC Market

Dell recently announced Latitude ON, a feature first made available on its new Z notebook and on select E-series, but to be made available on most Latitudes going forward. Its primary mission is to allow “instant on” access to e-mail, calendar and the Web without requiring full boot-up of the machine. This is similar to […]

How to Secure Laptops from U.S. Government’s Prying Eyes

On April 21, 2008, the 9th U.S. Circuit Court of Appeals essentially gave the U.S. government carte blanche permission to check any and every piece of data on laptops belonging to travelers passing into the United States at border control checkpoints. In its decision, the court stated that they “are satisfied that reasonable suspicion is […]

Census Plan Doesn’t Add Up

With much fanfare, the U.S. Census Bureau announced about two years ago that it was modernizing. The bureau said it would issue a state-of-the-art handheld computer to each of the 2010 census takers to record the count at each household and its specific location (via GPS) and then upload all the data for processing. The […]

How to Secure and Manage Enterprise IM

Publicly available free IM services (like AOL / AIM , Yahoo, MSN, Google and Skype), which currently are widely used in many large companies, will begin to be blocked from corporate networks and systems as corporate-friendly alternatives come online, and as companies realize they must deal with security and compliance issues. Managed and secure enterprise-grade […]

How to Incorporate Mobile IM into Your Company

Most IM installations are ad-hoc in nature, being driven not by company strategy, but by user demand. This is a very risky situation, as companies face increasing security threats all around and the need to set and enforce policies that will provide a level of protection against data breaches, and compliance regulatory malfeasance. Further, a […]

7 Steps to a Highly Effective Mobile Strategy

We believe that companies must focus on building out a mobile strategy that addresses the peculiarities inherent in mobile computing. The strategy leverages a number of uses across a variety of lines of businesses within the company so as to maximize the ROI (return on investment), standardize on architectures and platforms, and provide the most […]

How to Manage Core Expansion

What should enterprises do about multicore systems? First, companies should be planning now for multicore PC deployments for the next generation of products they purchase (in fact, most current enterprise-class notebooks and desktops already come with dual cores, and quad cores will be the norm in 2008/09). The biggest challenge is for software (both OS […]