<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-34083322</id><updated>2024-03-08T05:28:41.481-08:00</updated><title type='text'>ITworld Briefings</title><subtitle type='html'>On Demand Rich Media Featuring IT Experts</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>29</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-34083322.post-5558744949239556287</id><published>2007-07-09T11:59:00.000-07:00</published><updated>2007-07-09T12:08:07.087-07:00</updated><title type='text'>Integration as a Service: Are you connected?</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80077055/&quot;&gt;Is your organization still stuck in the 1990’s? Webcast Explains&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Building efficient, fluid connections with your customers is a business imperative in your competitive landscape. It’s no longer good enough to have the best product and service; you have to be the easiest to conduct business with. Bridging the process and system gap between you and your customers requires scale, agility, and next generation technology… but the payoff is tremendous.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#cc0000;&quot;&gt;NEW This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80079125/&quot;&gt;Managing Storage Growth with Intelligent File Virtualization&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Learn how file virtualization is revolutionizing file management for companies around the world by simplifying the complexity and cost of managing burgeoning file data. You&#39;ll get an end-user&#39;s perspective from Sean Maisey, Manager, IT Operations and Engineering, who has successfully implemented this technology to help The Colonial Williamsburg Foundation successfully management over 40 terabytes of storage.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80063595/&quot;&gt;Actionable Tips for Developing a Log Management Strategy&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Join Kelly Kavanagh, Principal Research Analyst from featured analyst firm Gartner Inc. and Doug Barbin, Security Architect from VeriSign, for a pre-recorded Webcast on &quot;Actionable Tips for Developing a Log Management Strategy.&quot; Learn what is required to implement a successful&lt;br /&gt;log management program, how organizations are addressing the issues associated with log management, and how to avoid some of the common pitfalls associated with deploying and managing a log management solution.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/5558744949239556287/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/5558744949239556287' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/5558744949239556287'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/5558744949239556287'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/07/integration-as-service-are-you.html' title='Integration as a Service: Are you connected?'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-7980312895632341764</id><published>2007-06-20T13:23:00.000-07:00</published><updated>2007-06-20T13:30:40.583-07:00</updated><title type='text'>Planning, Designing and Building A Business Intelligence Infrastructure</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80039118/&quot;&gt;Driving results through effective data integration and data quality&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Businesses today are often swimming in a sea of data, but many struggle to turn that data into actionable intelligence. In today’s business environment there is rapid proliferation and growth of data which is increasingly dynamic, and needs to be the most timely and accurate to drive better business decisions and operational actions. Learn how your organization can respond.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#3333ff;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80067719/&quot;&gt;Emerging Online Technologies to Build Loyal and Profitable Customer&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Your website is the face of your organization. In the face of smaller budgets and fewer resources, how do you determine the right technology to implement to enhance a user&#39;s experience and drive greater ROI from your website? In addition, how do you move at the speed of the web while considering these decisions carefully?</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/7980312895632341764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/7980312895632341764' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/7980312895632341764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/7980312895632341764'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/06/planning-designing-and-building.html' title='Planning, Designing and Building A Business Intelligence Infrastructure'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-8936955304161833502</id><published>2007-06-07T08:48:00.000-07:00</published><updated>2007-06-07T08:59:37.114-07:00</updated><title type='text'>Business Transformation through SOA: Evolve your IT Infrastructure</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6870/&quot;&gt;A Distributed Approach to SOA Providing Benefits Hard to Ignore&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The evolution of Service-Oriented Architecture is enabling businesses to realize low operating costs, high returns on existing and future IT investments, and a more modernized and streamlined IT infrastructure. Learn how your company can reap the business benefits of Service-Oriented Architecture (SOA) and hear experts discuss a distributed approach to SOA that is successfully sweeping the global market.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#006600;&quot;&gt;NEW This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/80042697/&quot;&gt;Relationship Based Pricing as a breakaway strategy for banks&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Banks are pursuing innovative and transformative customer service differentiation strategies to win and retain their client share in the highly competitive global financial services market. As products get commoditized, customers get more demanding and interest based income shrinking, banks are trying to differentiate with customer centric strategies like convenience banking, personalized and fee based products and packages as well as customer relationship based pricing. Learn more.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/8936955304161833502/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/8936955304161833502' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/8936955304161833502'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/8936955304161833502'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/06/business-transformation-through-soa.html' title='Business Transformation through SOA: Evolve your IT Infrastructure'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-4973595228553416272</id><published>2007-05-14T12:17:00.001-07:00</published><updated>2007-05-14T12:29:25.309-07:00</updated><title type='text'>Is your IT department proactive or constantly fighting fires?</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6886/&quot;&gt;Closing the Gap: Reactive to Proactive IT Service Management&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;How do you move from reactive to proactive IT service management? In this concise 17-minute webcast Gartner analyst David Williams discusses a new, automated paradigm for IT service management and introduces the innovative learning technologies that make it possible. IT operations executive Joseph Ambrose explains how his team used the approach to generate significant results at a Fortune 50 company.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#cc0000;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6725/&quot;&gt;Combating the Rising Tide of Web-Borne Threats&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Today, web content security means not only protecting your enterprise from nuisance adware and pop-ups; but more importantly, protecting against malicious spyware, Trojans, phishing and malware that are web-borne, dangerous and often criminal in nature. Learn how to stay ahead of the rising tide of web-borne threats to keep your enterprise and digital assets safe.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6101/&quot;&gt;Achieving Business Objectives Through the Convergence-Ready Network&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The networking world is constantly evolving. There&#39;s always a new challenge to wrestle with, be it: time-to-implementation pressures, scalability, reliability, investment protection, and so much more. So, how can enterprises best maximize their investments? And is there a future-proof solution for next-generation enterprise infrastructures? Learn from the experts.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6576/&quot;&gt;What Independent Software Vendors MUST consider when evaluating strategies for deploying their software as a service?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Software delivery is changing, and software companies without a Software-as-a-Service, or SaaS, strategy are going to fall behind their competition. As a software vendor, how do you decide the best SaaS strategy to complement or replace your existing on-premise application? In this webcast, learn from Gartner, USi, and Saba Software what factors Independent Software Vendors must consider to determine which software deployment models meet the needs of their customers while considering the potential business impact of delivering software in a new way.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/4973595228553416272/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/4973595228553416272' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4973595228553416272'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4973595228553416272'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/05/is-your-it-department-proactive-or.html' title='Is your IT department proactive or constantly fighting fires?'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-4967458351348991467</id><published>2007-04-13T13:42:00.000-07:00</published><updated>2007-04-13T13:45:44.818-07:00</updated><title type='text'>Achieving Business Objectives Through the Convergence-Ready Network</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/6101/&quot;&gt;Convergence-ready networks provide a foundation to support all applications&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The networking world is constantly evolving. There&#39;s always a new challenge to wrestle with, be it time-to-implementation pressures, scalability, reliability, investment protection and so much more. So, how can enterprises best maximize their investments? And is there a future-proof solution for next-generation enterprise infrastructures? In this webcast, trusted advisors from Gartner and Foundry Networks will address the networking challenges enterprises face and, more importantly, the solutions to solve those challenges and increase ROI.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/4967458351348991467/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/4967458351348991467' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4967458351348991467'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4967458351348991467'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/04/achieving-business-objectives-through.html' title='Achieving Business Objectives Through the Convergence-Ready Network'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-6674727729450393098</id><published>2007-03-29T10:47:00.000-07:00</published><updated>2007-03-29T10:52:12.864-07:00</updated><title type='text'>Advanced Fraud Techniques on the Upswing</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4760/&quot;&gt;Countering Sophisticated Fraud&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;How do you give your customers and your organization the most access while protecting them from cyber-fraud attacks? What are the most secure solutions?  Further, how can you use these solutions to automate business functions and increase self-service, thereby providing the strongest protection and cost savings?  Tune in and learn.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/6674727729450393098/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/6674727729450393098' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/6674727729450393098'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/6674727729450393098'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/03/advanced-fraud-techniques-on-upswing.html' title='Advanced Fraud Techniques on the Upswing'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-136014261980065486</id><published>2007-03-26T08:15:00.000-07:00</published><updated>2007-03-26T08:23:31.840-07:00</updated><title type='text'>A Strategic Use of Customer Feedback</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4133/&quot;&gt;An Enterprise Platform for Managing Customer Feedback: Strategies for Championing the Voice of the Customer Across your Organization&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Virtually all organizations collect some form of customer feedback, be it through individual surveys or regular customer interactions. But how many organizations actually make use of that feedback to enhance future interactions?  The sad reality is only about 10 percent. Tune in to this rich media program and learn from the experts on how to use EFM (enterprise feedback management) to improve strategic and operational efficiency.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#ff6600;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4960/&quot;&gt;CFO Priorities in the Performance Driven Enterprise&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Hear the experts discuss the many advantages Corporate Performance Management (CPM) offers, including a closed-loop approach to metrics, planning and reporting, particularly in regards to the finances,  consistency to your business processes, effective alignment between top-level goals and bottom-level objectives,  a more uniform approach to how information is gathered and controlled within the organization and a greater confidence in the numbers.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/136014261980065486/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/136014261980065486' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/136014261980065486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/136014261980065486'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/03/strategic-use-of-customer-feedback.html' title='A Strategic Use of Customer Feedback'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-4933084664753528587</id><published>2007-03-06T08:03:00.000-08:00</published><updated>2007-03-06T08:06:34.989-08:00</updated><title type='text'>Accurate and up-to-date data forms the foundation for flawless electronic business</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4470/&quot;&gt;Leveraging Master Data Management To Build The Foundation For Operational Excellence&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Improving quality of master data on a sustained basis is not simply an information technology problem that can be addressed through digital services alone. A successful master data management program requires the commitment of empowered people, effective processes, and well placed technology. The program you are about to see will look at the key components of a MDM program as well as the importance of planning to optimize your return on investment.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/4933084664753528587/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/4933084664753528587' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4933084664753528587'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4933084664753528587'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/03/accurate-and-up-to-date-data-forms.html' title='Accurate and up-to-date data forms the foundation for flawless electronic business'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-4615979449348046129</id><published>2007-02-26T11:56:00.001-08:00</published><updated>2007-02-26T12:01:40.917-08:00</updated><title type='text'>Free yourself from proprietary software stacks and architecture platforms</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4193/&quot;&gt;Executing a Business Process Platform Strategy&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Companies must re-think their business processes to keep pace with today&#39;s customer-driven business environment. Your systems now need to adapt to your business, and not the other way around. &quot;Change on demand&quot; is critical to quickly and effectively satisfy new business requirements.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/4615979449348046129/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/4615979449348046129' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4615979449348046129'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/4615979449348046129'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/02/free-yourself-from-proprietary-software_26.html' title='Free yourself from proprietary software stacks and architecture platforms'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-2912782231688457700</id><published>2007-02-26T11:56:00.000-08:00</published><updated>2007-02-26T12:01:10.307-08:00</updated><title type='text'>Free yourself from proprietary software stacks and architecture platforms</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/4193/&quot;&gt;Executing a Business Process Platform Strategy&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Companies must re-think their business processes to keep pace with today&#39;s customer-driven business environment. Your systems now need to adapt to your business, and not the other way around. &quot;Change on demand&quot; is critical to quickly and effectively satisfy new business requirements.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/2912782231688457700/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/2912782231688457700' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/2912782231688457700'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/2912782231688457700'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/02/free-yourself-from-proprietary-software.html' title='Free yourself from proprietary software stacks and architecture platforms'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-117201001518481942</id><published>2007-02-20T14:11:00.000-08:00</published><updated>2007-02-20T14:20:15.363-08:00</updated><title type='text'>Managing your telephony infrastructure with Unified Messaging</title><content type='html'>&lt;span style=&quot;font-size:130%;color:#ff0000;&quot;&gt;Spotlight:  Unified Messaging&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3726/&quot;&gt;Experts Weigh In: The Compelling Business Case for Unified Messaging&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Learn from experts and gain an understanding of the going-on in the message space and listen in on a discussion on why companies should implement unified messaging in the first place, and when they should start thinking about making the transition.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3727/&quot;&gt;The Unified Messaging Waters: What you need to know before you dive in&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Gain an understanding what unified messaging is all about and gain insight into making the business case for it. Further you&#39;ll hear a discussion from the experts explaining the difference between unified messaging and unified communications.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3728/&quot;&gt;Myth Buster: Unified Messaging Requires Out with the Old and in with the New&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Examine why it is not necessary to toss out our existing telephony infrastructure in order to implement unified messaging and gain a deeper understanding into how education and training are so critical to the success of unified messaging.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#ff0000;&quot;&gt;Other Programs to Check Out:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3985/&quot;&gt;A Universal Approach to Records and Retention Management&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In today&#39;s environment of increased risk, corporations need to focus early on an overall records and retention management process to remain compliant in their business processes and corporate disclosure practices, as well as be able to survive possible litigation.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/117201001518481942/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/117201001518481942' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117201001518481942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117201001518481942'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/02/managing-your-telephony-infrastructure.html' title='Managing your telephony infrastructure with Unified Messaging'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-117131333457080631</id><published>2007-02-12T12:34:00.000-08:00</published><updated>2007-02-12T12:50:24.373-08:00</updated><title type='text'>The Emerging Market for Wide Area Application Services</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3575/&quot;&gt;Succeeding with Enterprise Content Management&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In today&#39;s competitive environment, diverse technologies are coming together to help organizations boost overall productivity, provide better customer service, and enable compliance. Learn more.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3842/&quot;&gt;Enterprise Search: The Results You Need to Succeed&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Effective enterprise search means far more than finding information fast. It will make an organization more efficient, improve compliance efforts and keep you out of legal trouble. Then again, the meaning of enterprise search keeps expanding. It’s moved beyond documents to audio and video files, and it applies to both internal and external data. So organizations need more than just a search engine – they need an enterprise search solution</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/117131333457080631/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/117131333457080631' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117131333457080631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117131333457080631'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/02/emerging-market-for-wide-area.html' title='The Emerging Market for Wide Area Application Services'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-117045331274319820</id><published>2007-02-02T13:47:00.000-08:00</published><updated>2007-02-25T13:27:00.500-08:00</updated><title type='text'>The Archiving Imperative</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3645/&quot;&gt;Connecting the Dots: Enterprise Content Management and Archiving&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Organizations today are struggling with an explosion of information. At the same time, they must deal with increased regulatory oversight and risk of litigation involving information. This places IT managers in a difficult paradox: How does one keep information which might be needed to manage risk, while controlling runaway storage and management costs?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;NEW This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3708/&quot;&gt;Five Security Mistakes to Avoid&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;During this program, Shawn Bernard, security auditor at Networks Unlimited, identifies where vulnerabilities lie and offers practical tips that will strengthen your security posture for the long haul.  From insecure SNMP implementation and neglecting to encrypt mobile devices to continuing to use default passwords, find out how you can reduce your risk from Internet-based threats and malicious insider attacks.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/117045331274319820/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/117045331274319820' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117045331274319820'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/117045331274319820'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/02/archiving-imperative.html' title='The Archiving Imperative'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116984279641712784</id><published>2007-01-26T12:10:00.000-08:00</published><updated>2007-01-26T12:20:27.263-08:00</updated><title type='text'>Security Information Management: Insiders Reveal What You Need to Know</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2515/&quot;&gt;A solution that addresses risk management and compliance challenges&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Meeting compliance mandates while managing threats is a daunting task. An internal security breach or a hack to your network could cost your company millions and cause a myriad of compliance headaches. How can you make sure the right people have access to the information they need quickly and the wrong people don’t have access to the information at all? Tune in and learn.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;New This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10009957/&quot;&gt;Delivering More &quot;Service&quot; With IT Service Management&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Businesses increasingly rely on their IT departments to drive business objectives, help them reduce costs, while at the same time enhance overall productivity, security and improve customer satisfaction. Watch and learn how IT service management can help your business reach new heights.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2200/&quot;&gt;Beating Spyware before it beats you&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Experts examine the spyware challenges that companies face and, more importantly, the solutions that can solve those challenges. You’ll see why a multi-pronged solution offers the strongest defense against spyware, and why the best cure is stopping symptoms from being introduced in the first place.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116984279641712784/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116984279641712784' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116984279641712784'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116984279641712784'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/01/security-information-management.html' title='Security Information Management: Insiders Reveal What You Need to Know'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116863644813321903</id><published>2007-01-12T13:06:00.000-08:00</published><updated>2007-01-13T10:26:52.103-08:00</updated><title type='text'>Information Servers: Delivering Information You Can Trust</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/3005/&quot;&gt;Take Back Control of Your Information Assets With Information Servers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The need to integrate and access disparate information in consistent, trusted and reusable way has become even more critical as enterprises extend their boundaries to encompass global suppliers, partners, and customers. Learn more now.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116863644813321903/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116863644813321903' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116863644813321903'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116863644813321903'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/01/information-servers-delivering.html' title='Information Servers: Delivering Information You Can Trust'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116803184392580544</id><published>2007-01-05T13:16:00.000-08:00</published><updated>2007-01-05T13:38:01.456-08:00</updated><title type='text'>The growing trend of remote hosting: Is it right for you?</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog1/2451/&quot;&gt;Reduce Medical Errors And Improve Patient Safety With Remote Hosting&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Advanced clinical information systems are helping today’s successful healthcare organizations reduce medical errors, optimize care, and increase clinician efficiency. However, the initial capital costs required for upgrades to infrastructure, facilities, staffing and support often put these systems out of reach. As a result, many organizations are turning to remote hosting which offers predictable maintenance costs, reduced staffing, lower technical risks, and most importantly, the ability to focus limited resources on the core business -- patient care.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2683/&quot;&gt;Justifying Data at Rest Protection Investment in Your Organization&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Protecting data at rest is filled with challenges, ranging from legislative requirements to issues of cost control, ease of use, scalability, performance, and investment protection. So, what is the best solution to protect the confidential and personal data of your company, clients, and partners? Which solution will maximize your investment?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;&lt;strong&gt;Analyst Spotlight&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/x/blogger/621/3751/1600/997966/disbrow.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/x/blogger/621/3751/320/576989/disbrow.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Jane Disbrow,&lt;br /&gt;Research Director&lt;br /&gt;Gartner Research&lt;br /&gt;&lt;br /&gt;Ms. Disbrow is part of the IT Asset Management and Applied Research group. She covers software license agreements, best practices for contract terms and conditions, negotiation strategy, license metrics and software audits.&lt;br /&gt;&lt;br /&gt;Watch Jane here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10010796/&quot;&gt;Protecting Mission Critical Applications with Technology Escrow&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;What if a software development company, for instance, defaults on its maintenance and support contract? What leverage does the software licensee have to get the technical assistance it needs, especially if the software performs a mission-critical function? Learn why technology escrow plays a key role on any well-crafted technology license agreement.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116803184392580544/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116803184392580544' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116803184392580544'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116803184392580544'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2007/01/growing-trend-of-remote-hosting-is-it.html' title='The growing trend of remote hosting: Is it right for you?'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116647919412464091</id><published>2006-12-18T13:59:00.000-08:00</published><updated>2006-12-21T11:54:16.536-08:00</updated><title type='text'>Integrate or Consolidate? Real World Strategies for Next Generation IT Operations Management</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2503/&quot;&gt;Integrate or Consolidate?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Understanding the behavior of business applications, services, and processes, and related key performance indicators is critical for effective decision-making. Discover how to improve operational efficiency by consolidating the management of applications, systems, networks, and countless tools under a single pane of glass view.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:#000099;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2327/&quot;&gt;High-Density Data Center Cooling: Removing Heat, Optimizing Efficiency&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In this webcast, trusted advisors from Gartner, Emerson Network Power and Pomona Valley Medical Center break down the power and cooling challenges companies face and, more importantly, the solutions they can use to overcome those challenges.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116647919412464091/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116647919412464091' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116647919412464091'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116647919412464091'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/12/integrate-or-consolidate-real-world.html' title='Integrate or Consolidate? Real World Strategies for Next Generation IT Operations Management'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116587569659167065</id><published>2006-12-11T14:16:00.000-08:00</published><updated>2006-12-15T13:02:06.846-08:00</updated><title type='text'>Making the transition from paper to digital workflows a reality</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2221/&quot;&gt;Competitive Edge: Partnerships to improve business efficiency&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Hear from industry experts as they engage in a roundtable discussion on best practices to better manage the transition from paper based to digital documents. From scanning to analysis, learn how to build customized solutions based on your specific workflow, compliance and security needs.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;New This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2369/&quot;&gt;The Business Case for Remote Management&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;A growing number of organizations are tapping into data from intelligent devices. Remote management can and has enabled organizations to use this data to support their business objectives. How do you evaluate a remote management solution and its provider? How do you cost justify the investment? And what are remote management adopters saying about this technology? The program you&#39;re about to see provides comprehensive answers to these questions and more.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/1727/&quot;&gt;Solutions for multiple discreet regulatory regimes&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Discover a solution that simplifies and integrates multiple compliance regimes together, provides process-modeling tools that map, document, simulate and improve business processes, offers pre-constructed, out-of-the-box best practice models; validated for COBIT &amp;amp; ITIL frameworks, and identifies the value-add of bringing ISO standards into the mix.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116587569659167065/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116587569659167065' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116587569659167065'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116587569659167065'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/12/making-transition-from-paper-to.html' title='Making the transition from paper to digital workflows a reality'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116527086171923338</id><published>2006-12-04T14:17:00.000-08:00</published><updated>2007-02-24T23:03:39.530-08:00</updated><title type='text'>Pending Legislation Makes Employers Liable For Employee Internet Use</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/2200/&quot;&gt;Spyware: An Opportunistic Application&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Spyware is an opportunistic application that almost always requires user introduction at the desktop. Whether by naively clicking through pop-ups or by purposely installing unapproved and dangerous applications, a user is most likely behind any instance of spyware. Watch this on demand rich media Webcast and discover how to minimize privacy violations, reduce legal liabilities, decrease security threats, and improve your network integrity&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#333399;&quot;&gt;Analyst Spotlight&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/x/blogger/621/3751/1600/99794/bill.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/x/blogger/621/3751/320/824721/bill.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Bill Hostmann,&lt;br /&gt;Research Vice President&lt;br /&gt;Gartner Research&lt;br /&gt;&lt;br /&gt;Mr. Hostmann has worked for more than 15 years in the enterprise software market. He has held the position of Product Line General Manager for Informix Database and Internet Server product lines. Before that, he was Director of Marketing at GemStone Systems, an early Java application server company, where he was involved in the writing of the original Java EJB 1.0 specification.&lt;br /&gt;&lt;br /&gt;Watch and learn from Mr. Hostmann here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/1814/&quot;&gt;Trends and Directions in Business Intelligence&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Business Intelligence is one of the fastest growing and most important segments of the IT market. Whether you are a business professional seeking new insights into profitability, a service provider seeking to better understand client problems, or an IT manager needing to deliver useful information to your organization the discipline of Business Intelligence is critical.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116527086171923338/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116527086171923338' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116527086171923338'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116527086171923338'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/12/pending-legislation-makes-employers.html' title='Pending Legislation Makes Employers Liable For Employee Internet Use'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116466355060530133</id><published>2006-11-27T13:37:00.000-08:00</published><updated>2006-11-30T01:07:22.670-08:00</updated><title type='text'>Use Customer Data In Ways Your Competion Can&#39;t</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/1649/&quot;&gt;Forging A True Partnership With Customers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Watch this Webcast and hear how business intelligence solutions can help your organization integrate and use the data your already collect as part of your daily operations to help solve your customer challenges&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;NEW This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/1814/&quot;&gt;Trends and Directions in Business Intelligence&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Business Intelligence is one of the fastest growing and most important segments of the IT market. Whether you are a business professional seeking new insights into profitability, a service provider seeking to better understand client problems, or an IT manager needing to deliver useful information to your organization the discipline of Business Intelligence is critical.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/1695/&quot;&gt;Information Availability: How to protect your people, processes &amp; systems&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;There are no limits to when someone wants access to your company. Your information and systems need to be available 24-7 for people both inside and outside your company. Information availability is a crucial part of any organization’s success today. Protect your people, processes and systems.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;Analyst Spotlight&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/x/blogger/621/3751/1600/26320/Paul%20Proctor.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/x/blogger/621/3751/320/246734/Paul%20Proctor.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Paul Proctor&lt;br /&gt;Research VP&lt;br /&gt;Gartner, Inc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Mr. Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal &amp;amp; Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA).&lt;br /&gt;&lt;br /&gt;Watch Mr. Proctor here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10005896/&quot;&gt;Protect Your Information—Assure Electronic Documents Are Secure&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The move of more and more business processes from paper-based processes to electronic processes enables both organizational efficiencies and cost savings. Yet the need to assure your information is protected is more important than ever. You need to safeguard your intellectual property, protect confidentiality, maintain privacy, and conform to regulatory mandates.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116466355060530133/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116466355060530133' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116466355060530133'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116466355060530133'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/11/use-customer-data-in-ways-your.html' title='Use Customer Data In Ways Your Competion Can&#39;t'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116345657142984460</id><published>2006-11-13T14:14:00.000-08:00</published><updated>2006-11-15T13:12:11.930-08:00</updated><title type='text'>Visibility into Next Generation OSS</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10011668/&quot;&gt;Visibility into Next Gen OSS/BSS and Service Delivery Platforms&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;With convergence becoming a reality and service delivery platforms becoming much more sophisticated, the OSS/BSS functions no longer take the backseat. Learn from a discussion on the operational realities and the service delivery strategies that will allow service providers to streamline their business and technical processes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;Analyst Spotlight&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/621/3751/1600/Dave%20Russell.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/blogger/621/3751/320/Dave%20Russell.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Dave Russell&lt;br /&gt;Research Director&lt;br /&gt;Gartner Research&lt;br /&gt;&lt;br /&gt;Mr. Russell&#39;s research specialty is storage management software with a focus on data recovery, including continuous data protection (CDP) and storage resource management (SRM). For the last few years he has traveled the world meeting with customers, business partners and speaking at storage conferences and to the press. He was responsible for defining and driving the technical strategy for the data recovery, SRM and SAN Management offerings at IBM.&lt;br /&gt;&lt;br /&gt;Dave can be viewed here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/itwbriefingsblog/source/1/10008994/&quot;&gt;ILM: How Much Is Inactive Data Costing You?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Information Lifecycle Management (ILM) reaches right to the heart of what storage is all about. It’s about making sure you get the data you need when you need it, with no added burden on your IT staff or systems. Watch this new Webcast and hear trusted advisors discuss the challenges of ILM and more importantly, the solutions to overcome them.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116345657142984460/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116345657142984460' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116345657142984460'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116345657142984460'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/11/visibility-into-next-generation-oss.html' title='Visibility into Next Generation OSS'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116284752459848048</id><published>2006-11-06T13:11:00.000-08:00</published><updated>2007-01-17T01:55:36.643-08:00</updated><title type='text'>What you should know about offshore outsourcing to China</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10011649/&quot;&gt;China Outsourcing Strategies: Perceptions, Realities and Best Practices&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;With wage inflation and attrition rates rising to as high as 40% in global outsourcing locations, smart companies are looking to China to send offshore IT work. But outsourcing to China presents not only a unique set of advantages, but also its own set of challenges.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#ff6600;&quot;&gt;&lt;strong&gt;NEW This Week&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10010796/&quot;&gt;Protecting Mission Critical Applications with Technology Escrow&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Inherent to every technology license agreement is a level of risk. Companies that supply and demand technology must adjust to a fast-changing marketplace, and with such uncertainty, precautions are needed.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#ff6600;&quot;&gt;&lt;strong&gt;Analyst Spotlight&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/621/3751/1600/roster.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/blogger/621/3751/320/roster.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Jeffrey Roster&lt;br /&gt;Research Vice President&lt;br /&gt;Gartner Dataquest&lt;br /&gt;&lt;br /&gt;Jeffrey Roster is part of the IT Services group. In this role, he communicates global IT trends in the retail and consumer product industries, analyzes end-user requirements and consults on strategies with IT vendor clients. Mr. Roster also conducts primary research interviews with vendors and end users, performs secondary research and writes market research reports.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;See Jeff here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10008694/&quot;&gt;Maximize your WAN: Direct Network Connections add Security, Speed and Quality of Service&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Implementing a private wide area network that&#39;s right for your business comes with the typical challenges for implementing any enterprise-wide solution. These challenges include time-to-implementation pressures, cost control issues, scalability, reliability and performance.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116284752459848048/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116284752459848048' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116284752459848048'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116284752459848048'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/11/what-you-should-know-about-offshore.html' title='What you should know about offshore outsourcing to China'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116223799411612760</id><published>2006-10-30T11:46:00.000-08:00</published><updated>2007-02-08T15:23:55.006-08:00</updated><title type='text'>Gain a deeper understanding of business performance in real-time</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10011602/&quot;&gt;A Rapid-Value Approach to Service Visibility and Assurance&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;IT organizations are under increasing pressure to provide greater service visibility and intelligence to their customers – the line of business users that own profit and loss. As business success relies more and more on IT services, clear communication between the organization that delivers the services and the business users who consume them is critical.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;New This Week&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10010674/&quot;&gt;VCC vs. UMA: Two technologies or two different services&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Delve inside the topic of fixed/mobile convergence and uncover what role VCC and UMA play in the transition to converged networks.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116223799411612760/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116223799411612760' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116223799411612760'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116223799411612760'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/10/gain-deeper-understanding-of-business.html' title='Gain a deeper understanding of business performance in real-time'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116163714619119434</id><published>2006-10-23T13:56:00.000-07:00</published><updated>2007-02-19T19:05:13.873-08:00</updated><title type='text'>IT asset management is not just an IT issue, it’s a Business Issue</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10011247/&quot;&gt;Translating IT Asset Management into Business Service Value&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The impact that the IT infrastructure has in keeping the core business going is as vital as people or money or even electricity. But because IT asset data is dispersed in almost every phase of the enterprise, most companies have only been able to account for IT in broad strokes and with little accuracy, and that can seriously affect critical business decisions.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:180%;color:#333399;&quot;&gt;New This Week&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:180%;color:#333399;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10010684/&quot;&gt;Why You Need to Separate Backup vs. Archiving&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Join CXO Media’s Managing Editor Jim Malone and Brian Babineau of Enterprise Strategy Group as they discuss why organizations need to have two separate processes for retention and retrieval.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:180%;color:#000099;&quot;&gt;Analyst Spotlight&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;color:#000099;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/621/3751/1600/yefim.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/blogger/621/3751/320/yefim.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Yefim Natis,&lt;br /&gt;Vice President &amp;amp; Distinguished Analyst&lt;br /&gt;Gartner Research&lt;br /&gt;&lt;br /&gt;Mr. Natis&#39; research focuses on enterprise software infrastructure, including such technologies as application servers, application platform suites, integration middleware and TP Monitors. Mr. Natis also researches the fundamental software architectures, including event-driven architecture, service-oriented architecture and Web services, COM/COM+, .NET, J2EE and CORBA.&lt;br /&gt;&lt;br /&gt;Watch Yefim Natis here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10009046/&quot;&gt;Server Consolidation and Virtualization for Java Applications&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;IT departments running enterprise Java applications are embracing server consolidation projects to reduce capital and operational expenses and to drive up server utilization. In addition, there&#39;s an accelerating trend toward industry standard hardware platforms, which lend themselves to server consolidation.&lt;br /&gt;&lt;span style=&quot;font-size:180%;color:#000099;&quot;&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116163714619119434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116163714619119434' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116163714619119434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116163714619119434'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/10/it-asset-management-is-not-just-it.html' title='IT asset management is not just an IT issue, it’s a Business Issue'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-34083322.post-116102401751793193</id><published>2006-10-16T11:34:00.000-07:00</published><updated>2006-12-12T22:15:37.476-08:00</updated><title type='text'>30% of businesses experience disaster. Don’t be one of them</title><content type='html'>&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10010154/&quot;&gt;New disaster preparedness technologies&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Most businesses don&#39;t need an underground bunker in order to keep operating, but you do need to think about what you would do if disaster struck. We all hope disaster never strikes. However, world events have shown us that disasters can and do happen. A recent survey of CIO’s revealed that 30% had experienced some form of disaster, and that can translate into serious revenue loss. The good news is there are a lot of new technologies that can help insulate your company from loss.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;color:#000099;&quot;&gt;Analyst Spotlight&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://photos1.blogger.com/blogger/621/3751/1600/John%20Girard.jpg&quot;&gt;&lt;img style=&quot;FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand&quot; alt=&quot;&quot; src=&quot;http://photos1.blogger.com/blogger/621/3751/320/John%20Girard.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;John E. Girard,&lt;br /&gt;Vice President &amp; Distinguished Analyst&lt;br /&gt;Gartner Research&lt;br /&gt;&lt;br /&gt;John specializes in business security and privacy solutions for wireless and mobile road warriors, extranet, remote offices and teleworkers. Mr. Girard was European research director for New Science Associates(acquired by Gartner), and a founder of the advanced network computing research practice. Previously he was a software engineer at Pacific Bell, where he formed an Expert Systems R&amp;amp;D group and a software testing practice.&lt;br /&gt;&lt;br /&gt;See Mr. Girard here:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.accelacomm.com/jlp/itwbriefingsblog/1/10009960/&quot;&gt;Protecting Data on Laptops and PDAs&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Once company information leaves the office, it becomes vulnerable to loss or theft however, It seems we hear new reports of missing laptops and PDAs every week and when these devices contain sensitive personal information - social security numbers, credit card numbers, etc. - the consequences are particularly severe. Tune in and see how you can fight back.</content><link rel='replies' type='application/atom+xml' href='http://itworldbriefings.blogspot.com/feeds/116102401751793193/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/34083322/116102401751793193' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116102401751793193'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/34083322/posts/default/116102401751793193'/><link rel='alternate' type='text/html' href='http://itworldbriefings.blogspot.com/2006/10/30-of-businesses-experience-disaster.html' title='30% of businesses experience disaster. Don’t be one of them'/><author><name>ITworld Programming</name><uri>http://www.blogger.com/profile/15205455160080842054</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>