Trust me: Building strategic partnerships in a global marketplace
Trust has always been the cornerstone of a successful business relationship. But in a global marketplace, your business partners may include a myriad of companies spread across the globe, linked by information gateways.
Ready or not, new IT paradigm requires knowledge sharing — part two
A paradigm shift has rocked the information technology world, changing the way companies acquire the technical capabilities to complete business processes.
New kid on the block: Will WiMax bump Wi-Fi in municipal coverage plans? Part one
One day soon, mobile Internet users in Philadelphia, Denver, Boston and more than 300 wireless-networked cities across the nation won't need to find a coffee shop with WiFi access. They will simply open their laptops (or PDAs) and log on, wherever they are.
RFID technology gaining popularity with suppliers, retailers
Companies in the tech and pharmaceutical industries are increasingly adopting Radio Frequency Identification to track products from their manufacturing plants through the supply chain.
New IT paradigm: Software evolves from product to service
A sea change is reshaping the information services/information technology (IS/IT) industry.
IT systems security requires vigilance at all levels
The average hacker used to be a cyberspace vandal whose prime motivation was mischief and developing a reputation as an IT wizard. Over the past year, however, hackers have increasingly used their skills to break into inadequately guarded systems to steal money and valuable data.
Modern day James Bond shares tips for thwarting corporate spies
Most crooks aren't all that smart and spies are no exception, according to former National Security Agency analyst Ira Winkler. Getting confidential financial and technical information right from the source is simpler than you'd think.
Is centralized identity management the solution to cyber-security issues?
Passwords are "the dirty little secret" of the computer-security industry, says Arvind Krishna, a software security expert. The use –- and misuse – of passwords illuminates a cyber-security conundrum: is it about the user, or the data?
Spy vs. spy: FBI seeks sleuthing partners in Homeland Security mission
InfraGard is an association of businesses, schools, state and local law enforcement and private individuals dedicated to sharing information and intelligence "to prevent hostile acts against the United States." The FBI partner organization consists of a national network of 84 local chapters whose me
Whither 'internet anarchy?' controlling adult content online
The Internet Corporation for Assigned Names and Numbers (ICANN) -- the organization that determines who gets what domain name on the World Wide Web -- recently delayed decision on a proposed .xxx string that would identify content produced by the "responsible online adult-entertainment community." P