Monthly Archives: June 2005

Implementing an Effective Storage Strategy

In the wake of Sarbanes-Oxley, HIPAA, Basel II and other data retention regulations, compliance is a major concern for most organizations. Companies are implementing storage strategies that will allow them to manage their data and keep it accessible for compliance at the lowest possible cost. Before these strategies are put into place, however, there are… Read More »

UK to Become Haven for E-criminals

Half of IT security professionals believe that UK is danger of becoming haven for e-criminals due to lack of government support and investment in police resource, a new research reveals. IT security experts are calling on the government to take the lead role in combating e-crime.

Building an IT Foundation for a Sustainable Future

If you make business software decisions for an organization in the construction industry, or any of the industries closely affiliated with the construction industry, the future of your business can be summed up in one word: change. Demand is huge, capital is tight, and expectations are higher than ever.

The SME Guide to Open Source

The general view of open source software is that it is free; however, as with many things in business, information technology is never that easy. Switching to open source needs to involve careful planning and consideration of the business benefits and potential downsides to such a migration.

IT Project Management: Improving the Current State

As we all know by now, information technology service projects in today’s enterprise continue to have abysmal results in terms of achieving time and budget goals. In fact, most would go so far as to term project management as more of an art – albeit a failing one – than as a science.

Opening New Markets with a Next-Generation I/O Platform

The interface used to connect a system´s CPU to a storage device is critical to a user´s overall system performance. For success, the I/O interface’s cost, data throughput performance, reliability, flexibility, robustness, and ease of integration and migration must be balanced with the needs of the user.

Microsoft Pushing Anti-Spam Safety Bar

The software major Microsoft Corp is introducing a new safety-bar in its Hotmail accounts to warn users that the email they have received may be spam. However, the move is stepping up the pressure on email senders to adopt its Send ID spam fighting technology.

IT Poses an Unwanted SOX Surprise

The Sarbanes-Oxley Act of 2002 was intended to clean up corporate finance, but as an unintended side effect it has also revealed widespread problems with corporate information technology systems, according to a report surveyed companies that are complying with Sarbanes-Oxley requirements.

ILM – Information Lifecycle Misdirection

Great illusionists like Harry Houdini, David Copperfield and arguably David Blane escaped many strait jackets, and water tanks. Dumbstruck audiences rarely saw what was really going on. There was no danger, it just seemed that way. These magicians used their most simple, yet potent tactic, misdirection.