2004 - June
Software-based computing security and fault tolerance
by Goutam Kumar Saha
June 2004This article delineates a software approach to establish computing security and fault tolerance in various computing systems. This low-cost approach is useful to tolerate malicious code modifications and transient faults without additional costs for hardware and extra software versions.
Ann Kirschner on marketing and distribution of online learning
by Ann Kirschner
June 2004Outside of business schools, the very word "marketing" makes most universities uncomfortable, as does the idea of students as customers. But the world of higher education is becoming increasingly competitive. Fathom, named for the double idea of comprehension and depth, was a milestone in the evolution of online learning and a prototype of where things are headed.
An Interview with Don Tapscott: Memo to CEOs: Do your best, partner the rest
by Ubiquity staff
Review of "Does it matter? Information technology and the corrosion of competitive advantage" by Nicholas G. Carr, Harvard Business School Press, 2004, Boston, Massachusetts
by John Stuckey
Protecting intellectual property rights through information policy
by Karthik Raman
June 2004In today's electronic world, an organization's intellectual property is sometimes its biggest asset. Much time and money can be saved, and frustration and litigation avoided if company policy dictates ownership and use of intellectual property.
An Interview with Nicholas G. Carr: Do you really need that next upgrade?
by Ubiquity staff
June 2004Nicholas G. Carr talks about capitalizing on the commoditization trend by spending less on technology but getting better, more reliable systems. His suggestion that CEOs step away from the cutting edge has defenders and detractors in the IT community.