Search Results

Results 121-140 of 200 for Andrew K. Burger

Tricky Business: Building Fault-Tolerant Web Services

Web services and underlying service oriented architectures (SOAs) offer organizations a heretofore unattainable capacity to capture information from disparate information resources by directly representing and linking these assets, making them available selectively across their information systems environments ...

The Mushrooming Menace of Keyloggers

There may be few things as disturbing to Internet users as the thought of someone spying on them and capturing their every keystroke. Unfortunately, this has been happening more frequently as the use of keyloggers, phishing and spoofing grows ...

Is the World Ready for Mobile Marketing?

As the evolution of integrated, multimedia wired and wireless networks and services continues apace, be prepared for the rise of mobile marketing -- or m-marketing -- in the United States as telcos open up their platforms to third-party content providers ...

VoIP and the Emerging-Market Call Center

The stage is set for further growth in Voice over Internet protocol communications with technological advances, telecom market deregulation and a growing web of fiber optic and wireless networks ...

Developing a Code of Conduct for Comparison Shopping Engines

The Association for Retail Technology Standards (ARTS) got busy early this year. The technology standards division of the National Retail Federation (NRF), ARTS began in 2007 with the introduction of several e-commerce data and content management standards ...

Building the Case for Biometrics

Biometrics -- or biometric authentication -- refers to technology that measures and analyzes human physical characteristics for security purposes ...

PRODUCT PROFILE

SalesAdvizor for Salesforce.com Aims to Simplify BI

Business intelligence is a fast-growing segment area in the on-demand market. BI solutions help enterprises track performance, understand business drivers, and manage an organization's overall operations ...

Developing Best Practices to Combat ID Theft, Part 2

Approximately 10 million Americans fall victim to identity theft each year, a statistic that is expected to increase despite the diligent efforts of government and institutions to turn the tide, as discussed in Part 1 of this two-part series ...

How Tough Is Vista’s Defensive Lineup?

It's open season on Windows Vista for hackers, crackers and virus and malware propagators ...

Developing Best Practices to Combat ID Theft, Part 1

Currently, identity theft may be the most worrisome and threatening problem for online users and the businesses and institutions that support them ...

Meeting the SaaS Security Challenge

2007 enterprise software budgets are showing a 10 percent year-over-year increase, according to a recent Forrester Research survey, with software-related spending expected to account for 30 percent of the total ...

New Layers of Defense: ID Theft and Authentication, Part 2

"It was the best of times; it was the worst of times." The oft-cited quotation from Dickens' "A Tale of Two Cities" seems apt when talking about the opportunity presented by digital communications and computing ...

Is That Really You? ID Theft and Authentication, Part 1

Cybercriminals are as gung-ho about perpetrating online fraud as financial institutions and governments are dedicated to preventing it. As long as people send private, sensitive information and transactions over computer networks, the prospect of identity (ID) theft and subsequent online fraud will loom large ...

The Bumpy Road to Mobile Media Convergence

Industry participants and observers are looking for big things to happen in the smartphone space this year, as progress is being made in both technological and commercial realms ...

The March of the Smartphones

2006 was a pivotal year for the smartphone industry, with significant technological developments and changes in industry practices and operation ...

M-Commerce Market on the Move, Part 3

Change is the order of the day in the m-commerce market. New smartphones and other handheld digital devices are hitting the marketplace in a torrent, as media convergence accelerates the drive toward "quad play" devices and network services. The telecom and media industries are undergoing a fundamental restructuring, with new market entrants that are focused on bridging the gap between content origination and network distribution as the primary agents of change...

Energy, Commodities and the Internet, Part 2

Coming off a record-setting year, momentum continues to build at the Intercontinental Exchange (ICE) as it moves into 2007. As detailed in Part 1 of this two-part series, the ICE has become a leader and successful innovator in the field of exchange-based energy and commodities trading ...

Putting the Business Intelligence Puzzle Together, Part 2

Organizations of all types are increasingly turning to business intelligence (BI) applications -- a combination of data mining, statistical, and numerical analysis and data visualization -- to better manage and make sense of the ever-growing amounts of data they are collecting ...

M-Commerce Market on the Move, Part 2

New technological advances, as well as legal and regulatory changes, are tearing down long-standing barriers between industries ...

RFID and Wireless Sensor Networks in the Supply Chain

The use of RFID technology in the retail industry has been increasing, albeit tentatively, and the debate over RFID in general continues unabated. Meanwhile, proponents are finding that RFID adoption is easier in the manufacturing sector and upstream in the supply chain, in areas such as asset tracking and inventory management, as well as security-related, government-driven applications, such as international air travel...

Technewsworld Channels