Commentary
Content posted in August 2005
<<   <   Page 2 / 2
Expiring Jars
Commentary  |  8/5/2005  | 
So around the end of July our customer service application, developed by an outsourcer as part of this review in early 2005, died. Bruce is conducting a BSM review using NWC Inc. applications, and noted that the app was broken....
Proprietary standards
Commentary  |  8/5/2005  | 
So I'm coming up with a list of the most proprietary equipment on enterprise networks and need some help. I'm starting off with power supplies/adapters, rack ears, and console cables. Help me out here. The Standards Guy...
Taking Wrong Turns On The Security Front
Commentary  |  8/5/2005  | 
In my newsletter note this week I alluded to the fact that I had had a very tough week personally--all those adages about when it rains, it pours and the belief by some that God only burdens you with as...
Ramblin' On: Have Cell Phone, Don't Travel; The Good Doctor
Commentary  |  8/5/2005  | 
While perusing through some of the news sites today, I spotted one of those 'slap you upside the head' kind of headlines on msnbc.com -- "Why cell phone service here sucks," by Gary Krakow. Rather than regurgitate everything that Mr....
Friday Freebies
Commentary  |  8/5/2005  | 
Yup! You guessed it - there are two, count them TWO, freebies this week. Our first freebie is from Greenplum, who is releasing version 0.6 of Bizgres, the business intelligence suite based on the open-source database, PostgreSQL. This is still...
Patience Is A Virtue
Commentary  |  8/4/2005  | 
Computing years are kind of like dog years: Each one seems to correspond to something like seven actual human years when you consider the pace of development throughout nearly any platform....
And So -- What's Up With The Focus On Fraud?
Commentary  |  8/4/2005  | 
We've long been covering plain old phishing attacks, you know those e-mail messages you and your users get that tell you to update your financial information, or check your balances, or give you some other mealy-mouthed excuse to hand off your financial log-in information. On the surface, they look like specialized spam, but those "phishermen's special" e-mail messages are the tip of a very insidious iceberg that includes criminal theft of identity and money from innocent people and from the fin
We Know What You're Thinking! Early Results from the NWC Annual Survey
Commentary  |  8/4/2005  | 
We're less than a week from closing out our annual Network Computing reader survey, and the responses have been fascinating so far. If you haven't answered our survey, you have until Aug. 10 to make your voice heard: just go...
Keeping Identities Safe
Commentary  |  8/4/2005  | 
Sorry for the delay in getting this week's podcast up, but I think it will be worth the wait, since we have a great interview on identity theft and what companies should be doing to keep their customers from becoming...
Call to boycott IE7 too little, too late
Commentary  |  8/3/2005  | 
Windows Guru Paul Thurrott called yesterday for a boycott of IE7 after the [sarcasm]startling revelation[/sarcasm] by Microsoft Internet Explorer (IE) Lead Program Manager Chris Wilson in his blog that IE7 would most certainly fail the ACID2 test. Paul, Paul, Paul!...
Market Saturation and you.
Commentary  |  8/2/2005  | 
You know, early on in the storage boom we were led to believe by almost everyone - journalists, pundits, analysts, even investment bankers, that the boom times for high-end storage were coming because of the ever-increasing data needs of the...
Vonage's Citron: Wireless Broadband Here To Stay
Commentary  |  8/2/2005  | 
I have to thank Vonage and CEO Jeffrey Citron for making me look smarter than I am: Less than a week after suggesting that the Voice over IP market leader should do more deals with wireless service providers, Vonage announces...
The Wireless Edge: The Uneven Uptake of Wireless Data
Commentary  |  8/2/2005  | 
Why is Wi-Fi surging ahead and why is cellular data still struggling, even against the backdrop of global 3G network deployments? The simple answer is that Wi-Fi is fast, cheap and easy while cellular data remains slow, expensive and complicated....
Taming of the Rules
Commentary  |  8/2/2005  | 
When I recently took a look at BPM Suites I noted a lack of seperated BREs (Business Rules Engines) in most products. One of the players in that review, Ultimus, recently shipped its Ultimus Director, a new module for its...
Building An SOA Pipeline
Commentary  |  8/1/2005  | 
Service-oriented architecture may be a hot buzzword to some in IT right now, but when it comes to implementing a comprehensive IT-business strategy, buzzwords don't mean much. So why is
<<   <   Page 2 / 2


Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed