Anne Chen

About

As a senior writer for eWEEK Labs, Anne writes articles pertaining to IT professionals and the best practices for technology implementation. Anne covers the deployment issues and the business drivers related to technologies including databases, wireless, security and network operating systems. Anne joined eWeek in 1999 as a writer for eWeek's eBiz Strategies section before moving over to Labs in 2001. Prior to eWeek, she covered business and technology at the San Jose Mercury News and at the Contra Costa Times.

Analyzing a Good Net Career

At Kelley Blue Book Inc., nothing new is done without a road map. As owners of the venerable Kelley Blue Book car-pricing manual, the company, based in Irvine, Calif., employs Web data analysts who spend months determining how visitors navigate its Web site before recommending new tools and changes to Web developers. “Were a conservative […]

Laying the Groundwork for B2B

Top U.S. negotiators working on Chinas re-entry to the World Trade Organization arent the only ones trying to clear major roadblocks. In a country where business is based on guan-xi (relationships) and IT investments are almost always focused on lowering costs, U.S. enterprises have to work especially hard to persuade Chinese companies to buy into […]

Scaling the Wall

More than 2,000 years ago, invading tribes from the north were repulsed by the 1,500-mile Great Wall, built by vassal states of the Qin Dynasty to protect the fertile lands of China. At the beginning of the 21st century, the walls that separate the Chinese economy from the rest of the world are poised to […]

Souping Up Wireless

Sometimes Cindy Groner must feel like shes swimming in circles in a sea of acronyms. As director of mobile traveler services at Sabre Inc., Groner oversees a team of wireless developers who, in the process of coming up with new wireless services for Sabres customers, must create multiple versions of each page. One in the […]

XHTML Backed by the Big Boys

The certainty that XHTML basic will emerge as the standard language for next-generation wireless devices lies in the fact that it is backed by two organizations with tremendous clout: the WAP Forum, owner of the Wireless Application Protocol specification, and Nippon Telegraph and Telephone Corp.s wireless division, DoCoMo, in Tokyo, which has more than 23 […]

ERP II: Its Alive!

About this time last year, as the stampede to the Internet and e-business grew, you could stick a fork in the ERP market. It was dead. Muerto. Not alive. Enterprise resource planning, common wisdom held, didnt fit e-business. Not only were most ERP software suites still based on outmoded client/server technology, they focused on improving […]

ERP Vendors Push Private Exchanges

Revamping ERP to support collaborative commerce is becoming increasingly common. But, experts say, corporations shouldnt stop there. As organizations turn their attention toward linking their enterprise resource planning systems to the Internet, they should also focus on building and integrating them with a private trading exchange. “We expect over the next few years that companies […]

Digital Detectives Track Hacks

If e-business had a modern-day Sherlock Holmes, his name would be David Dittrich. Dittrich, a security manager at the University of Washington, in Seattle, is one of a rare breed of security pros—the computer forensics expert—whose skills are getting ever more precious as the number of computer crimes spirals. These are the data detectives who […]

Getting Help Desk to Fly High

Eighteen months ago, if The Boeing Co.s help desk had had radar to track incoming calls from users whod forgotten passwords, the screen would have been lit up like a Christmas tree. Why? Because a whopping 500,000 such calls a year used to get stacked up in a gridlocked holding pattern. At what Gartner Inc. […]

Securing Wireless Transactions

Implementing PKI in the wired world is becoming an increasingly important way to authenticate and secure e-commerce transactions. But, experts say, security managers shouldnt stop there. The same security and identity verification capabilities that are making PKI important for wired transactions will also make it a fit for wireless transactions, experts say. Various public-key infrastructure […]