Anne Chen

About

As a senior writer for eWEEK Labs, Anne writes articles pertaining to IT professionals and the best practices for technology implementation. Anne covers the deployment issues and the business drivers related to technologies including databases, wireless, security and network operating systems. Anne joined eWeek in 1999 as a writer for eWeek's eBiz Strategies section before moving over to Labs in 2001. Prior to eWeek, she covered business and technology at the San Jose Mercury News and at the Contra Costa Times.

E-Travel Books With MSSP

How would you feel if you were spending 40 percent of your annual IT budget on security—software, hardware and people—but your business-to-business customers still insisted on third-party confirmation that your network was locked down? Probably a lot like Geoff Teekema, CIO at e-Travel Inc., who decided last year to outsource some operations to an MSSP, […]

New HP Will Stay Committed to Open Source

HONOLULU–The recently combined Hewlett-Packard Co. and Compaq Computer Corp. will remain committed to open standards and to the role it will play in developing secure IT infrastructures, said Rich DeMillo, vice president of technology strategy of HP during his keynote speech at the International World Wide Web Conference on Friday. That commitment, he said, will […]

Berners-Lee Issues a Call to Arms

HONOLULU– Tim Berners-Lee, director of the World Wide Web Consortium, opened the 11th annual International World Wide Web Conference here on Wednesday by challenging his colleagues not to get bogged down in arguments over existing specifications but to move forward and develop new ones while remaining focused on interoperability between standards. “We have so many […]

Nielsen Picks From Sun Menu

How do you roll out a major enterprise application in a timely and cost-effective manner when simply deploying and testing the hardware for the new system can take months and add way too many dollars to the final project cost? For Kim Ross, CIO at Nielsen Media Research Inc., the answer was to get his […]

Sniffing Out Rogue Wireless Lans

With the price of 802.11b wireless access points dropping fast, its not surprising that unsanctioned WLAN connections are popping up like weeds on corporate networks. Thats a problem for network managers because most wireless LANs that are based on the 802.11x standard lack built-in security, leaving corporate networks open to potential hacking. As a result, […]

Web Directories Dial In

No doubt youve heard about the UDDI Business Registry, the online registry that uses the Universal Description, Discovery and Integration standard. Backers such as Microsoft Corp. say it will one day become the worldwide yellow pages for locating and accessing Web services. Its less likely that youve heard about the UDDI registry Greg Clark recently […]

Backup Window Shrinks, but Not the Cost

Not long ago, companies that wanted to remain competitive couldnt afford to take key systems offline for things such as scheduled maintenance or storage backup for more than a few days each month. Today, as enterprises go global and become increasingly dependent on transaction-oriented systems, many are seeing the time window available for storage backup […]

eGov Prompts Ambitious Agency Efforts

Two years ago, soon after enactment of federal mandates to make information accessible to constituents online, the Federal Aviation Administration scrambled to get its compliance effort off the ground. Various departments within the agency that managed their own Web pages began posting information in an inconsistent fashion. The result: a hodgepodge site that took as […]

Grappling With Compliance

Just how likely are federal agencies to meet their eGov deadlines? While the White House Office of Management and Budget said it expects all federal agencies to comply with the GPEA (Government Paperwork Elimination Act), experts say theyre not optimistic. In fact, some agency IT chiefs said compliance efforts in recent months have had to […]

Threats to Come

Attention, security managers. Stephen Northcutt has a warning for you: Within six months, a worm will likely appear on your network and begin targeting your networks SNMP vulnerabilities. Start patching now. How does Northcutt, principal incident handler for The SANS Institute and former chief of Information Warfare at the Department of Defenses Ballistic Missile Defense […]