Pages: pp. 7-10
As economic woes continue worldwide, a survey conducted by CIO Magazine in October revealed that roughly 72 percent of IT managers said they had postponed or will postpone discretionary IT projects. IT budgets haven't escaped, either: 40 percent of IT managers plan to cut their budgets from the prior year, and to further cut costs, roughly 23 percent have delayed new technology purchases. Trickling down from the financial industry's troubles, unfavorable financing terms or conditions from vendors and lenders has led 35 percent to wait to make purchases. Around 14 percent of managers have cancelled technology purchases altogether. As a result, 35 percent of CIOs expect purchase decisions to be moved higher up the management food chain as profits continue to fall.
In terms of personnel, 46 percent of IT managers have put a freeze on hiring, letting open positions remain open, and 23 percent have started to reduce IT headcount. An additional 11 percent plan to start reducing staff in the next six months. However, it's not all doom and gloom: sixty-six percent of respondents said they won't reduce headcount.
Although companies are reducing travel (56 percent), cutting salaries (18 percent), and scaling back on contractors and consultants (44 percent) to cut costs, demand for outsourcing has increased. In a survey of 200 outsourcing service providers conducted by InfoWorld, 40 percent have seen an increase in demand for services. The survey found that Europe had a stronger demand than North America (64 percent versus 25 percent).
On the flip side, the weak economy has produced a buyer's market for consumers. Companies have more bargaining power when renewing or purchasing software licenses or negotiating software maintenance fees. Forrester Research analyst Ray Wang recently wrote in a blog post ( http://softwareinsider.blogspot.com/2008_10_01_archive.html), "Now's the time to buy more licenses should you need them and if you have the cash to spare. Vendors remain anxious for new deals and new deals are far and few between. Apply lessons learned from the last economic downturn. Discounting will include nonlicense areas such as implementation, training, and support. Push for maintenance fee decreases where possible."
In early October, Sprint launched Xohm, its WiMax wireless broadband data service in Baltimore. Although WiMax services can operate at speeds up to 4 Mbps and for a fraction of the cost of T1 lines, WiMax has its own share of potential dealbreakers that businesses should consider before adopting:
Despite these considerations, WiMax offers some positives, including security and development history.
As for Xohm, Sprint plans to deploy services in several large cities such as Boston, Chicago, and Washington, DC. Sprint will merge Xohm with Clearwire's WiMax service later in the year. The merger will bring cities such as Anchorage, Alaska, Honolulu, Hawaii, and Nashville, Tennessee into the Xohm fold, as well as smaller cities in areas such as central California, Florida, and Minnesota.
In October, IBM released Bluehouse ( https://bluehouse.lotus.com/), an Internet-based collaboration and social networking service. With Bluehouse, IBM is hoping to stave off competition from companies such as Microsoft, Amazon, and Google, which have launched cloud computing services of their own. Bluehouse offers developers online communities and meetings, as well as document and contact sharing to help businesses communicate with each other. Bluehouse's services don't require users to install any software on their PCs. IBM is offering the service for free as part of a public beta phase until it releases the commercial version later this year.
Hoping to lure enterprise customers from desktop-based software, Google introduced a service-level agreement for its Google Apps Premier Edition. Google will credit customers with additional service time if it doesn't hit its 99.9 percent per month uptime mark. Compensation starts after 45 minutes of downtime per month. Outages of fewer than 10 minutes won't count, however, nor will downtime for scheduled maintenance if Google has provided more than five days' prior notice. Google says scheduled downtime won't be more than 12 hours per year. It will credit customers with an additional three days of service for an uptime of 99 percent; seven days for percentages between 95 and 99; and 15 days for anything less than 95 percent.
Nigeria, home to its fair share of 419ers and other online fraudsters, plans to switch tactics and go after fraudsters perpetrating from their homes. Between December 2007 and October 2008, Nigeria's Economic and Financial Fraud Commission (EFCC) focused its efforts on raiding cybercafes, making several arrests. However, with many of their operation bases being targeted by authorities, the scammers took their electronic toys and went home, moving their operations to private homes and hotels with broadband or wireless connections they could pick up easily with their mobiles. To combat the underground scammers, the EFCC is in discussion with mobile Internet operators to access background data on users. This won't be easy: the EFCC is up against a coverage area roughly four times the size of Great Britain, giving scammers plenty of areas to move to while launching scams on the go. Additionally, the EFCC is lobbying for registration of Internet access points and subscriber identity modules (SIMs). To cut down on the number of fraudsters using hotel rooms with which to launch their online scams, the EFCC has started to ask hotels to photocopy passports or ID cards in addition to obtaining full client information.
Slow sales might force WabiSabiLabi to close its online 0-day marketplace a year after launching. The auction site features unpatched security vulnerabilities submitted by security researchers. Buyers can bid on the information, giving security researchers a chance to earn money from their discoveries. WabiSabiLabi evaluates buyers before granting them access to the marketplace to ensure security research doesn't fall into the hands of potential attackers.
Instead, the company might shift its focus to its line of unified threat management (UTM) appliances that are nearing their commercial release date. The UTM suite, called OneShield, helps defend networks against attacks. It also borrows from WabiSabiLabi's 0-day auction site: customers who purchase a OneShield security device will pay a monthly subscription fee that gives them access to a 0-day library. Independent security researchers can contribute to the library and earn a monthly royalty from their contributions, paid from the subscription revenue.
In October, Verizon released a supplemental analysis report ( www.verizonbusiness.com/resources/security/databreachsuppwp.pdf) to its Business Data Breach Investigation report released in June that showed user error as the cause of most IT breaches. The supplement analyzes data from the financial services, technology, retail, and food industries between 2004 through 2007. Of the four industries studied, the tech sector leads in internal user-error breaches at 39 percent. According to the supplement, 56 percent of the financial sector's breaches were from external sources versus 41 percent from partner-caused breaches. The food and beverage industry posted the biggest difference: eighty percent of breaches were external whereas only 4 percent were from internal sources. Verizon is compiling a new report that will include data from 2008 and is expected to be released next year.
In April, Yahoo acquired Index-Tools, a provider of Web analytics software, paving the way for the beta release of its own analytics tool in October. Yahoo Web Analytics ( http://web.analytics.yahoo.com/) will be available first to Yahoo's small business users who host e-commerce sites, advertisers in the company's custom solutions and buzz marketing programs, and developers who are members of Yahoo's developer network or use Yahoo APIs. Yahoo is touting the tool's real-time component, which lets users see within minutes how changes to ad campaigns affect traffic and adjust if they see a slide in site performance. Additionally, the tool gives users access to data in nonaggregated, raw form so they can create customized reports based on current and historical data. Finally, Yahoo's tool uses a drag-and-drop interface that lets users quickly filter data and create reports.
Microsoft recently released its Concurrency & Coordination Runtime (CCR) and Decentralized Software Services (DSS) Toolkit ( www.microsoft.com/ccrdss). The CCR lets developers create concurrent and asynchronous programs; DSS helps distribute applications across several computers. The toolkit is based on the REST protocol and contains the .NET and Compact Framework class libraries with a notification publish/subscribe model included.
Microsoft originally released the toolkit as part of its Robotics Developer Studio but found that developers were using it for other applications and ignoring the robotics capabilities, so the company decided to release the toolkit without those components. The toolkit is available for purchase online for US$399.95.
The Linux Foundation released a beta version of Linux Standard Base (LSB) 4.0 in October that reconciles differences between Linux distributions and cuts the costs to port applications to different distributions. The kit lets developers create applications to earlier Linux Standard Base specs without changing software developer kits. Using LSB 4.0, developers can build to LSB 3.0, 126.96.36.199, or 4.0 specifications. LSB 4.0 contains a shell script-checker that detects potential problems between distributions. For security, LSB 4.0 includes Mozilla Network Security Services and Netscape Portable Runtime and offers Secure Sockets Layer capabilities. Developer tools and test suite for LSB 4.0 are available from www.linuxfoundation.org/en/LSB/.