Archives ||About Us || Advertise || Feedback || Subscribe-
-
Issue of August 2003 
-
- - -
-

August 2003

NETWORK SERVICES
ARCHIVES
SUBSCRIBE
CUSTOMER SERVICE
CONTACT US
ADVERTISE
ABOUT US
Event Downloads
Click below for Research/ Presentations from our events
Infrastructure Strategies 2003
Business Continuity
tSource
 COVER STORIES: ENTERPRISE-WIDE IT PROJECTS

Walking the fine line
The success of an enterprise-wide IT project depends on good planning and design. Here's an account of the few things that really matter. by Brian Pereira

Risky Business
A new IT project is a risky proposition. There are hard risks, soft risks and risks that you cannot foresee. But how do you identify and plan for such risks? by Brian Pereira

The recipe for Business Contracts
Incorporating processes like risk assessment, risk management, and negotiation before signing the contract will enable the IT user and vendor to have a well documented contract in place. by Minu Sirsalewala

[an error occurred while processing this directive]

Justifying project spend
Approaching top management for project funding may be the toughest thing yet for CIOs. So what's the pitch to make? How are funds allocated? by Brian Pereira

[an error occurred while processing this directive]
INBOX READERWARE SHELF SPACE
 EDIT

It's Risky Business
As a financial year draws to a close, IT managers are confronted with certain hypercritical questions for potential IT projects.

 NEWS & ANALYSIS
More networked storage this year
Hackers taste their own medicine
802.16a gets a hand
How to reduce TCO for desktops
Carriers need alternate revenue streams
News Briefs
 SECURITY

Security Watch
Secured View - Because business must go on
Here's what you can do to make your business continuity plan effective. by Avinash W. Kadam

 CASE STUDIES

Escorts AMG’s ERP upgrade
New tools at Escorts AMG
L&T’s Product Lifecycle Management
L&T: Smaller lifecycle, better profit

 IN PERSON

Windows Server 2003
Betting on Server 2003
IP VPNs
VPNs in the enterprise

 VENDOR VOICE
Identity Management
Beyond Firewalls and Passwords
Security solutions are often a trade-off between "strong security" and "user convenience." An identity management solution maximizes both security and usability. by Samal Chandran
 xSP

Security Service Provider
Security on a pipe
It may be a good idea to outsource your security needs, especially to avoid the capital and operational expenditure in procuring equipment, managing infrastructure, and hiring qualified personnel. A look at how a Managed Security Service Provider can help you. by Soutiman Das Gupta

-
- - -
- <Back to Top>-  

Copyright 2001: Indian Express Newspapers (Bombay) Limited (Mumbai, India). All rights reserved throughout the world.
This entire site is compiled in Mumbai by the Business Publications Division (BPD) of the Indian Express Newspapers (Bombay) Limited. Site managed by BPD.