Information Professional
Volume 4, Issue 3, June 2007
Volume 4, Issue 3
June 2007
-
- Source: Information Professional, Volume 4, Issue 3, page: 2 –2
- DOI: 10.1049/inp:20070309
- Type: Article
- + Show details - Hide details
-
p.
2
(1)
- Source: Information Professional, Volume 4, Issue 3, page: 4 –4
- DOI: 10.1049/inp:20070310
- Type: Article
- + Show details - Hide details
-
p.
4
(1)
- Source: Information Professional, Volume 4, Issue 3, p. 5 –7
- DOI: 10.1049/inp:20070311
- Type: Article
- + Show details - Hide details
-
p.
5
–7
(3)
- Source: Information Professional, Volume 4, Issue 3, page: 9 –9
- DOI: 10.1049/inp:20070300
- Type: Article
- + Show details - Hide details
-
p.
9
(1)
Big announcements in the router/switch arena have tended to concern strategy for next-generation Internet protocol (IP). However, the greatest product interest of late has been focused not on a launch, but on the retirement of some venerable Cisco lines. After condemning the 1700,2600, and 3700 series routers to obsolescence, the axe fell on the 7500 in December 2006. These retirements have put the spotlight on rivals, offering them just the whiff of a chance in prise open some Cisco accounts. Any response from I hem has had to be framed in the context of Cisco's Integrated Services Router (ISR) strategy. Which took shape during 2005. 3Com's response was delivered in January 2007, with an ambitious riposte in the shape of Open Services Networking (OSN), greeted by some analysts as the company's last throw of the dice in the market for routers and high-end switches. It committed the company to a difficult programme of delivering a coherent set of network layer services surrounding its underlying router/switch platform, with a strong emphasis on Linux and Open Source. While Cisco is also embracing Linux within ISR, 3Com is promoting a looser coupling, actively involving third parties, as well its own developers. - Source: Information Professional, Volume 4, Issue 3, p. 10 –11
- DOI: 10.1049/inp:20070301
- Type: Article
- + Show details - Hide details
-
p.
10
–11
(2)
Asynchronous JavaScript and XML (AJAX) - the programming technique that combines scripts running on a browser with server code to build more interactive Web sites and distributed applications - is coming under scrutiny for its potential to wreck the security plans of the people that use it. Unwittingly, developers may be opening up gaping holes in their organisation's network defences by not taking active steps to lock out hackers and viruses. - Source: Information Professional, Volume 4, Issue 3, p. 12 –13
- DOI: 10.1049/inp:20070312
- Type: Article
- + Show details - Hide details
-
p.
12
–13
(2)
Key ICT contract news from the academic, local government, defence, catering, food manufacturing, telecommunications and financial services sectors. - Source: Information Professional, Volume 4, Issue 3, page: 14 –14
- DOI: 10.1049/inp:20070302
- Type: Article
- + Show details - Hide details
-
p.
14
(1)
It may not be apparent, but software is already big business in China. According to the country's Ministry of Information Industry (MII), software sales in the country grew almost a quarter to hit 480bn ($60bn) in 2006, overshadowing the UK's software market. Exports of software from China are more modest, although they don't compare poorly with many developed countries, such as the UK, according to the Chinese government's own figures. (3 pages) - Source: Information Professional, Volume 4, Issue 3, p. 18 –20
- DOI: 10.1049/inp:20070313
- Type: Article
- + Show details - Hide details
-
p.
18
–20
(3)
The IT director at Capespan discusses getting to grips with shipping tens of millions of units across a network of 14 countries. - Source: Information Professional, Volume 4, Issue 3, p. 21 –22
- DOI: 10.1049/inp:20070303
- Type: Article
- + Show details - Hide details
-
p.
21
–22
(2)
In many cases, estimates of reuse from SOA implementations already carried out have fallen short of the target to justify the move. SOA reuse properties are said to be one of its biggest selling points; but a model for best practice in this area is only now emerging. One of the selling points for moving to a service-oriented architecture (SOA) is that you will get much more code reuse than with traditional approaches to implementing IT systems. Although these systems are called monolithic, they still have interfaces that can be used as the basis for extending them to a SOA workflow. - Source: Information Professional, Volume 4, Issue 3, page: 23 –23
- DOI: 10.1049/inp:20070314
- Type: Article
- + Show details - Hide details
-
p.
23
(1)
- Source: Information Professional, Volume 4, Issue 3, p. 24 –26
- DOI: 10.1049/inp:20070304
- Type: Article
- + Show details - Hide details
-
p.
24
–26
(3)
There is one date that people working in the IT function of the financial services sector have on their mind: 1 November 2007. This is the date that Markets in Financial Instruments Directive MiFID - comes into play. But for many companies, the need to be prepared for compliancy is only just coming to the forefront of agendas. The IT implications are significant, with significant departures from current service standards required to meet the Best Execution and Reporting requirements In particular. However, the strategic implications are equally profound. - Source: Information Professional, Volume 4, Issue 3, p. 27 –33
- DOI: 10.1049/inp:20070305
- Type: Article
- + Show details - Hide details
-
p.
27
–33
(7)
This article reveals how RFID is infiltrating our personal and professional existences. There seems to be no limit to the things that companies have proposed as targets for various types of radiofrequency identification (RFID) systems, They range from passive tags, which could replace the barcode, through the contactless smartcards used by ticketing systems, through to long-range active tags, which are powerful enough to be found tensor hundreds of metres away from a reader. In some cases, it is hard to find advantages over existing systems, especially when concerns over privacy or intrusiveness are taken into account. For example, two-dimensional barcodes can carry more information, are cheaper, and are no less secure than passive RFID tags. In some respects they are actually more secure because it is hard to read a 2D code surreptitiously and it's hard to erase or rewrite a 2D label, short of planting another one on top. In other cases, RFID tags can bring significant advantages, cutting down on the paperwork needed to record how products move around a distribution network, or trying to find an available crash unit in a busy hospital. - Source: Information Professional, Volume 4, Issue 3, p. 34 –36
- DOI: 10.1049/inp:20070306
- Type: Article
- + Show details - Hide details
-
p.
34
–36
(3)
As the law calls upon enterprises to excavate their digital landfill, many are looking to enterprise content management strategies to offset e-mageddon. Enterprises are at last waking up and with a start - to the implications of the regulatory cascade started by Sarbanes-Oxley (SOX), widely regarded as an over hasty response to accounting mega- scandals such as Enron. Yet, for all its perceived faults. SOX has reset the tone for major reforms with huge implications for IT and the practice of enterprise content management (ECM) in the UK and Europe. The spotlight falls particularly on email, for several reasons, relating to the nature of the medium, its use or misuse for serious business negotiations, and above all its inconsistent and disorganised archiving and management. - Author(s): B. Little
- Source: Information Professional, Volume 4, Issue 3, p. 38 –40
- DOI: 10.1049/inp:20070307
- Type: Article
- + Show details - Hide details
-
p.
38
–40
(3)
The need for compliance and litigation readiness is no longer a US-specific requirement, but one that also crosses the pond to reach the UK. Now the debate has shifted to the issue of whose responsibility it is to make sure that a company complies with data retention and deletion requirements set out by regulatory bodies such as the FSA, and by laws such as the Data Protection Act and the UK Companies Act, and how this is best achieved. - Source: Information Professional, Volume 4, Issue 3, p. 41 –42
- DOI: 10.1049/inp:20070308
- Type: Article
- + Show details - Hide details
-
p.
41
–42
(2)
Network access control should represent an integral part of overall network security. Cyber crime continues to rise, with the primary aim to steal employee or customer data. In order to avoid the unwelcome headlines that an IT security failure invariably provokes, securing the corporate network is now more important than ever. It's important to prioritise whose access needs to be controlled first, before segmenting all users into groups based on their profile. Following this, a company can determine what information needs to be gathered from users before access is granted. In this last case, the organisation must identify when the compliance check take place - before or after the machine in question connects to the network. Finally, there is a need to continually manage security policies for different user's types and across different access methods. - Source: Information Professional, Volume 4, Issue 3, p. 44 –45
- DOI: 10.1049/inp:20070315
- Type: Article
- + Show details - Hide details
-
p.
44
–45
(2)
- Source: Information Professional, Volume 4, Issue 3, p. 46 –48
- DOI: 10.1049/inp:20070316
- Type: Article
- + Show details - Hide details
-
p.
46
–48
(3)
Contributors
Editorial and Letters to the Editor
News
Router wars
Has AJAX over exposed itself? [Asynchronous JavaScript and XML]
Sector specific
China goes soft on the west
My way: Interview with Tom Quets
Getting SOA to come back for more [business data processing]
If you ask me
MiFID: are you ready? [compliance IT systems in financial services sector]
RFID is all around you
ECM's new can of worms [enterrprise content management]
Whose data is it, anyway? [data retention policy]
The knack of NAC [Network access control]
Editorial archive
Diary: Partner events
Most viewed content for this Journal
Article
content/journals/inp
Journal
5
Most cited content for this Journal
We currently have no most cited data available for this content.