Year: 2005

  • The Wizard Behind SAP’s Channel Curtain

    The Wizard Behind SAP’s Channel Curtain
    Categories:

    Imagine a world of cooperation instead of cutthroat competition. Imagine a world where your vendor partner provides you with all of the marketing, training, certification and SDKs to enable you to properly represent, sell, deploy and customize the software platform you are selling and building solutions around. And imagine a world where end-user customer satisfaction… Read more

  • The Caribbean Needs IT Providers

    Categories:

    The global reach of the IT service sector has left few geographic markets untouched. But officials at Satyam Computer Services Ltd. believe they have hit upon one: the Caribbean islands. Satyam, which operates in 46 countries, including the Caribbean region, co-sponsored a business technology conference in Port of Spain, the capital of Trinidad and Tobago… Read more

  • Cellular Offers a Rich Integration Opportunity

    Cellular Offers a Rich Integration Opportunity
    Categories:

    Need a phone in Japan? The Vodafone counter at Tokyo Narita airport will sell you a phone with a prepaid card for around a hundred dollars, less of a hassle than rental. Even though it’s an outdated, cheap model, my new flip phone is the tiniest I’ve ever owned, with front and back color screens… Read more

  • Oracle-on-Microsoft Shops Face Double Patching Delight

    Oracle-on-Microsoft Shops Face Double Patching Delight
    Categories:

    Patching systems is always painful, but Tuesday’s scenario of two major cumulative patch sets on the same day—from Oracle and Microsoft—is downright sadistic. When will this patching madness end? Not soon. Although there’s a concerted effort on the part of ISVs to develop more secure code, analysts predict that it will take generations before this… Read more

  • ‘Critical’ Kerberos Flaws Could Open Networks to Attack

    ‘Critical’ Kerberos Flaws Could Open Networks to Attack
    Categories:

    Kerberos, the popular authentication protocol developed by the Massachusetts Institute of Technology, is vulnerable to three serious flaws that could allow an attacker to gain access to protected corporate networks, MIT researchers disclosed late on Tuesday. Unix variants such as Solaris and Apple Computer Inc.’s Mac OS X, and Linux distributions such as Red Hat… Read more

  • Build a Compact Pentium M PC

    Build a Compact Pentium M PC
    Categories:

    Something Old, Something New Last year, Dave Salvator took a look at the inner workings of the latest Intel mobile processor, code-named Dothan. Dothan is the second-generation Pentium M processor, built on Intel’s 90nm manufacturing process and sporting 2MB of L2 cache. Later, Jason Cross investigated Dothan’s performance in his review of the Pentium M… Read more