The knowledge economy makes all of us designers every day. We need to become more adept at inventing and crafting new solutions to new problems.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Organizations are having second thoughts about the offshore outsourcing craze
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Up to now, service enablement has largely been the baby of C-level executives and line-of-business managers.  Many IT professionals see the promise of the technology, but warn that the reality is several years away.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IT staff transferred to your service provider don't face a bright future
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Disk-to-disk solutions are marketed as tape killers.  We found one product that may actually live up to that claim.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Architecting fine-grained access to Web Services for many users at multiple organizations is difficult to implement or audit using identity management software. We discuss alternatives.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Business Objects bills XI Built for Operational BI as a version of its BI suite that’s optimized for operational decision-making
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    Based on the experiences of several users, BIRT looks like a good start—which should only get better
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Technology is seen as a potential boon to Oracle’s Fusion Middleware initiative
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    How organizations can get (and stay) compliant while spending less
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Implementing a preventive methodology helps establish a solid infrastructure, raising the outsourcing organization's accountability, forcing them to write better code
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Unisys, creator of the first Intel “mainframe,” announced a capacity-on-demand service for the x86 and IA-64 set
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Few users think Sun’s stewardship will be a good thing for StorageTek or its customers
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    IT hiring activity looks to be on the rise, but IT compensation levels are stagnating.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Backups do fail.  ServerGraph provides a troubleshooting tool to track down and help you solve problems.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer? 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    With Dynamic ODS, DataMirror hopes to break out from its association with AS/400 in the minds of customers
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Microsoft Updates XP WiFi Security, Worm Goes Right-Wing
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The need to protect its IM users from outside attacks, spam, and regulatory requirements leads Kansas’ largest electric utility to adopt IM monitoring software.