Search Results

Results 101-120 of 198 for Andrew K. Burger

SaaS in East Asia, Part 2: Expanding to SMBs

Although in its infancy, the market for on-demand application systems, including software as a service (SaaS), is taking root and growing rapidly in East Asia, as was seen in Part 1 of this series ...

The Emergence of Next-Gen Networks, Part 3: WiMAX

Network connectivity has quickly and quietly become necessary -- and is sometimes even taken for granted -- in today's high-tech, instant-communications environment ...

SaaS in East Asia, Part 1: Breaking Ground

Software as a Service, also known as "on-demand software," is making inroads across East Asia as organizations large and small become comfortable enough with Web services and network application delivery to risk using them for a variety of business functions ...

The Emergence of Next-Gen Networks, Part 2: Wireless

With the emergence of wireless networking, ultra slim notebooks, PDAs (personal digital assistants) and smartphones, mobile communications have quickly become an integral part of doing business. Mobile capabilities are set to take another leap forward with the introduction of new standards for wireless broadband wide- and local-area networking ...

The Emergence of Next-Gen Networks, Part 1

Enterprise IT departments are straining despite huge increases in network capacity in the past decade. There are growing concerns over bandwidth availability, interoperability and security, as online video, VoIP (Voice over Internet Protocol), social networking and on-demand application services proliferate ...

Ethernet’s New Security Layer

Ethernet has been steadily extending its influence as it continues to evolve beyond the local area network.The ongoing development of virtual local area network, or VLAN, standards, is paving the way for Ethernet to play a key role in next-generation networking ...

Greasing the Wheels of M-Commerce, Part 2

In five years, the number of mobile phone subscribers is expected to increase by more than two billion -- at that point, the way people purchase goods and services could be forever changed ...

Greasing the Wheels of M-Commerce, Part 1

Originally established as part of a series of the global system for mobile communications standards in 1985, short message service, or SMS, has come to play a pivotal role not only in the evolution of personal mobile communications but in the development of m-commerce as well ...

Network Security, Part 2: NAC Moves Up the Architecture

Businesses and large institutions dreaming of enforcing consistent security policies are finding solace in network access control, or NAC -- programs that establish authentic users, identify network devices, perform integrity checks, take remedial actions and authorize access to information system resources based on organization-wide security policies...

Network Security, Part 1: The Buzz About Network Access Control

Demand is high for a super system that can promise protection from external threats while organizations' networks, data and software applications become increasingly interconnected ...

At the Movies: Digital Delivery Takes Off, Part 2

Digital cinema distribution and projection systems are gaining momentum, while the film industry is seeking new ways to pack theaters. AsPart 1 of this two-part series points out, the new formats not only offer film studios, distributors and cinema operators significant cost reductions, but also provide unrivaled viewing experiences that competing media will find difficult to match...

At the Movies: Digital Delivery Takes Off, Part 1

It was a time-tested tactic during ancient Roman times for generals to embrace their adversaries and bring them into the fold when they represented significant threats to the Empire that they could not otherwise defend against ...

The Great Internet TV Race, Part 2

The great Internet TV race is on, and the field is crowded -- and getting more crowded all the time. The biggest names in U.S. TV broadcasting want to make sure they stay in the middle of things ...

The Great Internet TV Race, Part 1

There's a new wave of changes headed for the TV and film industries: Television viewers can choose what they watch, when and how they view programs and -- with the advent of wireless mobile broadband and smaller viewing screens -- where they catch up on their favorite shows. That's just the beginning ...

M-Commerce Hot Spots, Part 2: Scaling Walled Gardens

M-commerce, or mobile commerce, is poised to grow into a multibillion dollar market over the next decade. Phone handset makers, telecoms and content providers are pushing the technologies that will enable users with m-commerce-enabled devices to easily purchase products and services via the phone ...

M-Commerce Hot Spots, Part 1: Beyond Ringtones and Wallpaper

As voice, data, wired and wireless telecommunications converge, conditions are ripening for the extension of e-commerce to mobile, or m-commerce, in markets around the world ...

Outsourcing, Part 2: Uncovering the Hidden Costs

Outsourcing continues to grow at a healthy rate. As the market expands to include a wider range of business processes, competitive cost opportunities in emerging markets are pressuring management decision-making ...

Outsourcing, Part 1: Is Resistance Futile?

Some 90 percent of brand owners outsource at least some of their manufacturing, according to AMR Research. In addition, more than half of them expect to increase their use of contract outsourcing over the next two years ...

Tricky Business: Building Fault-Tolerant Web Services

Web services and underlying service oriented architectures (SOAs) offer organizations a heretofore unattainable capacity to capture information from disparate information resources by directly representing and linking these assets, making them available selectively across their information systems environments ...

The Mushrooming Menace of Keyloggers

There may be few things as disturbing to Internet users as the thought of someone spying on them and capturing their every keystroke. Unfortunately, this has been happening more frequently as the use of keyloggers, phishing and spoofing grows ...

LinuxInsider Channels