Boardroom

SPECIAL REPORT

CTO Wish List for 2004

With the makings of an economic recovery on the horizon, IT budgets are beginning to grow again, and CTOs finally may be able to translate their mental wish lists into tangible purchases. However, the lessons of the downturn are still fresh in most people's minds, so CTOs likely will keep a tight re...

In an effort to downplay rumors that Hewlett-Packard will seek to beef up its consulting division by purchasing a major computer services company, such as EDS, HP CEO Carly Fiorina said she has passed on opportunities to make additional acquisitions. Instead, she said, she will focus on her company'...

E-BUSINESS SPECIAL REPORT

BroadVision Bets on the New E-Commerce Upsurge

As BroadVision celebrates its first decade in the e-business arena, the company is breaking the silence it has maintained for the past several quarters, in which it flew under the radar as it reorganized and refocused its business. Now, the firm is fiscally healthier and hungry for new customers -- ...

E-BUSINESS SPECIAL REPORT

Breeding Grounds for Aspiring CIOs

So you want to be the boss -- the head technology honcho with the CIO title. But when you shake off that daydream, you look around and see the cubicle of a low- to mid-level IT manager. How can a garden-variety IT professional break into the ranks of C-level management? According to executives who w...

While this bottom-line focus may seem like a return to normalcy for those who entered the workforce before the dot-com boom, twentysomethings who first entered the professional employment arena during those halcyon days have come crashing brutally to Earth. Perhaps for the first time, they are encou...

E-BUSINESS SPECIAL REPORT

Think Like a Hacker: The Best Scanning Tools

In the world of computer security break-ins, the focus has shifted from alleged hacker masterminds to enterprise shortfalls -- unpatched software, poorly secured firewalls and weak computer passwords. However, vulnerability assessment tools are educating IT admins about how to close holes in network...

E-BUSINESS SPECIAL REPORT

Honing the Blade Server Edge

As the latest, most compact iteration of server technology, blade servers are becoming increasingly popular. Although blades currently represent just 1 or 2 percent of total server market share, IDC analyst Mark Melenovsky said he believes they will capture 20 percent or more of server unit sales by...

E-BUSINESS SPECIAL REPORT

Supersizing the SAN Without Breaking the Bank

Gorging on enterprise infrastructure was de rigueur in the go-go 1990s, but a drop in capital spending has heralded the arrival of new methods of building out networks in small increments. In the storage networking arena, budget-conscious CIOs are focusing on such cost-cutting measures as utility co...

E-BUSINESS SPECIAL REPORT

Security Threats That Can’t Be Stopped

While enterprises face all kinds of security risks, including vulnerabilities that must be patched and viruses that bombard corporate firewalls, the threats that strike the most fear into the hearts of chief security officers and their employees are the ones nobody has thought of yet. "There are no ...

E-BUSINESS SPECIAL REPORT

The Real IT Integration Challenge

Bringing together various applications and computer systems is certainly no picnic, but another vital integration challenge is often overlooked in the corporate dialogue: integrating the IT department with the rest of the enterprise. How can a CIO ensure that his or her department is involved in sha...

E-BUSINESS SPECIAL REPORT

Best Firewalls for Big Enterprises

With multiple offices, thousands of employees and a wealth of electronic access points into their systems, large enterprises must lock down a great deal of infrastructure to stay safe. Thanks to vendors that are committed to providing the locks in the form of firewalls, CIOs can sleep a bit better.

E-BUSINESS SPECIAL REPORT

How To Hire a Security Guru

As software flaws, wireless network holes and data thieves continue to make companies vulnerable to technological bad guys, a growing need for security experts has driven more IT workers toward this constantly changing field. However, the search for the right security guru can be a tricky one. After...

E-BUSINESS SPECIAL REPORT

Riding Out the IT Perfect Storm

Back in the IT good old days -- just three or four years ago -- money was plentiful, nearly all projects were approved, expanding bandwidth and the Internet made all things possible, and confidence in the economy ran high. What happened next has been described by Harvard University lecturer and auth...

E-BUSINESS SPECIAL REPORT

Anatomy of a Hostile Takeover

In macro terms, the hostile takeover has been a common, if generally reviled, tactic throughout human history. But does this art of war hold up over the long term in the business world? Are there times when such shotgun marriages turn out to be the right decision for the parties involved? Amid the O...

E-BUSINESS SPECIAL REPORT

To Outsource or Not To Outsource?

Most CIOs at some point have asked: Should I outsource this IT project? The answer can be surprisingly complex, depending on the reasons for considering such a move. According to Gartner principal analyst Bruce Caldwell, savings achieved through outsourcing can be significant -- in the 20 to 30 perc...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

E-Commerce Times Channels