07.13.04

Linux IT Services Market Poised for Rapid Growth
The market for IT services around Linux and other open source software projects is expected to more than double between now and 2008, according to International Data Corp, but will remain a small percentage of the overall services market.

Linux and free software is responsible for less than 1% of the total Western European IT services market, according to research firm IDC, but is growing faster than the market as a whole and is set to hit $228m by 2008 from $98m today.
Read The Whole Article

Open Country Seeks to Simplify Linux Management
While many IT managers gravitate toward administration tools from large providers, one upstart vendor is attracting attention with simple Linux desktop and server management software that balances functionality with low cost and ease of use.

Open Country Inc., which counts among its customers Cisco Systems Inc., Intel Corp. and Electronic Data Systems Corp., this week will launch OC-Manager. The tool supports standard and enterprise versions of Linux and provides operating system provisioning, software and patch management, asset management, backup and restoration, remote system administration, and remote control from a centralized console.
Read The Whole Article
Selectively changing the source
SELECTIVE sourcing is an increasingly popular choice for businesses disillusioned by full-blown outsourcing, but managing multiple providers can prove to be difficult.

The shift to selective in Australia, in large part, has been driven by the perceived failure of classic everything-but-the-kitchen-sink IT outsourcing, often favoured in corporates and government departments through the late '90s, to deliver major savings or benefits.
Read The Whole Article


A valuable proposition
Take a look at a lot of the sales material provided by IT vendors and you would think the only criterion used by businesses for buying products is cost, and that unless a return on investment (ROI) can be shown in a matter of months, customers will not be interested in a proposition, whatever it is.

Quocirca research shows that ROI is not the primary driver for most IT purchases, but that businesses consider a number of factors. These range from hard-edged financial objectives, such as revenue generation and cost reduction, to softer ones such as reliability and customer satisfaction.
Read The Whole Article

IT Gets Organized: Introducing The Office of the CIO
ORGANIZATIONAL STRUCTURE is one tool that CIOs wield in their perennial effort to build a better IT group. Now a new structure, the Office of the CIO, or OCIO, has gained favor in government and academic circles, and is spreading to large companies in the private sector.

Simply put, an Office of the CIO structure is a team-oriented approach to IT management in which the CIO delegates specialized IT roles-essentially, the ideal IT org chart. An OCIO is born out of a desire for solid IT governance processes-a vision of repeatable IT processes, clear lines of project accountability and consistent communication of standards. It's meant to leave CIOs time to rub elbows with their executive brethren. Which is exactly what they should be doing.
Read The Whole Article


How to Spoof-proof Your Logins
Depending on which side of the consumer-business equation you are on, you might either expect to perform a transaction with another machine or you might expect a person to be on the other end of the transaction. When you run a business that requires legitimate user-accounts, you may be surprised to find that some of your accounts may belong to a single person—one using a skillfully-crafted script running on his machine to create many "virtual" accounts with your business. These accounts tie up your resources, bandwidth, and other time and materials.

The process by which such scripts create accounts is called identity spoofing, and—for most simple sites—can be accomplished rather easily. All the spoofer needs to do is to create an HTML form that contains fields identical to those in your login form and then "HTTP-POST" the data to your server, where your user-account creation process takes place. The problem is even worse if you allow your login forms to be processed via "HTTP-GET". After successfully creating an account once, there's nothing stopping the spoofer from automating the whole process.
Read The Whole Article




Read this newsletter at: http://www.itmanagementnews.com/2004/0713.html
Free Newsletters
Part of the iEntry Network
over 4 million subscribers
ITManagementNews
WebProASP
SecurityConfig


Send me relevant info on products and services.


 

 

 

-- ITManagementNews is an iEntry, Inc. publication --
iEntry, Inc. 880 Corporate Drive, Lexington, KY 40503
2004 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | free newsletters | comments/feedback | submit article






ITManagementNews Home Page About iEntry Article Archive News WebProWorld Forums Jayde iEntry Contact Advertise Downloads iEntry SQLProNews.com TheDevWeb.com