Jim Louderback

About

With more than 20 years experience in consulting, technology, computers and media, Jim Louderback has pioneered many significant new innovations.While building computer systems for Fortune 100 companies in the '80s, Jim developed innovative client-server computing models, implementing some of the first successful LAN-based client-server systems. He also created a highly successful iterative development methodology uniquely suited to this new systems architecture.As Lab Director at PC Week, Jim developed and refined the product review as an essential news story. He expanded the lab to California, and created significant competitive advantage for the leading IT weekly.When he became editor-in-chief of Windows Sources in 1995, he inherited a magazine teetering on the brink of failure. In six short months, he turned the publication into a money-maker, by refocusing it entirely on the new Windows 95. Newsstand sales tripled, and his magazine won industry awards for excellence of design and content.In 1997, Jim launched TechTV's content, creating and nurturing a highly successful mix of help, product information, news and entertainment. He appeared in numerous segments on the network, and hosted the enormously popular Fresh Gear show for three years.In 1999, he developed the 'Best of CES' awards program in partnership with CEA, the parent company of the CES trade show. This innovative program, where new products were judged directly on the trade show floor, was a resounding success, and continues today.In 2000, Jim began developing, a daily, live, 8 hour TechTV news program called TechLive. Called 'the CNBC of Technology,' TechLive delivered a daily day-long dose of market news, product information, technology reporting and CEO interviews. After its highly successful launch in April of 2001, Jim managed the entire organization, along with setting editorial direction for the balance of TechTV.In the summer or 2002, Jim joined Ziff Davis Media to be Editor-In-Chief and Vice President of Media Properties, including ExtremeTech.com, Microsoft Watch, and the websites for PC Magazine, eWeek and ZDM's gaming publications.

Demo Spotlights Enterprise Security tools

As more and more systems and users get hooked up to public networks, and as more and more wireless networks come on-line, IT managers are faced with a dual threat. How do I provide ready access to all my systems and data wherever my users might be, while still protecting vital corporate access? Two of […]

TurboTax: So What Do I Do Now?

Like many of you, Ive been avidly following the DRM dust-up between Intuit and unhappy TurboTax customers. And because I edit ExtremeTech, Ive had a professional as well as a personal interest in the outcome. While I shared the outrage of ExtremeTech members, I knew it was important that we do a thorough and impartial […]

Making IT Travel Agent

Its time for IT departments to absorb business travel planning because its outgrown agencies and agents. Sound radical? How much of your responsibility involves remote access? Wireless data and voice? How important is constant connectivity? Probably more important than wringing the last dollar out of travel. Lets start with hotels. Many professionals require high-speed access […]

Too Much of a Good Thing

Why doesnt this stuff work together?” I first heard this back in the early 80s as a technology analyst in Chase Manhattans back office. Digital was selling VAXes to translate among IBM mainframes, and I discovered that connecting mainframes to PCs required something called IRMA, as well as cookies for the sysop. “Why doesnt all […]

Benchmarks Challenged

So now CEOs have to sign off on their companies financial statements—on pain of imprisonment. I wish industry marketers were held to the same standard. The latest “benchmarketing” flap concerns Intel and AMD. According to AMD, BAPCo, a nonprofit consortium, has unfairly stacked the deck in Intels favor. BAPCo was founded by vendors and publishing […]

Hacker Tools Can Benefit IT

At a recent Las Vegas hacker confab, Defcon, attendees were invited to try their luck with a wireless 802.11b network. The results were intriguing or scary, depending on your perspective. One of Air Defenses WLAN security appliances detected 807 attacks within 2 hours. That sounds like a lot. More than half of those attacks, however, […]