Thursday, October 20, 2005

Does Sarbox Compliance Yield Business Improvement?

<html>
<head>
<title>ITBE - Managing Compliance Standards</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
<META NAME="ROBOTS" CONTENT="NOARCHIVE">
<!-- Remove robots meta before posting to archives -->

<link href="../itbereport.css" rel="stylesheet" type="text/css">
</head>

<body bgcolor="#FFFFFF" link="#000099">

<style type="text/css">
<!--
.SecHed {
font-family: Tahoma, Arial, Helvetica;
font-size: 12pt;
font-weight: bold;
color: #000099;
padding-bottom: 4px;
margin-bottom: 4px;

}
.Body {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
}
.BodyBold {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
}
.BodyItal {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
font-style: italic;
}
.BodyItalLink {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
font-style: italic;
text-decoration: underline;

}
.BodyBoldRed {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #990000;
}
.BodyBoldRedItal {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #990000;
font-style: italic;
}
.Small {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
}
.SmallBold {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: bold;
}
.SmallBoldOrg {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: bold;
color: #FFEB9A;
}
.SmallBoldLink {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: bold;
text-decoration: underline;
}
.SmallLink {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
text-decoration: underline;
}
.SmallBoldRed {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: bold;
color: #990000;
}
.SmallBoldWhite {

font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: bold;
color: #FFFFFF;
}
.SmallALink {
font-family: Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
text-decoration: underline;
}
.SmallALinkWhite {
font-family: Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
text-decoration: underline;
color: #FFFFFF;
}
.BodyBoldA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
}
.BodyBoldRedA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #990000;
}
.BodyBoldLinkA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
text-decoration: underline;
}
.BodyBoldWhiteA {

font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #FFFFFF;
}
.BodyA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
}
.SmallA {

font-family: Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
}
.SmallAGreen {
font-family: Arial, Helvetica, sans-serif;
font-size: 9px;
font-weight: normal;
color: #008040;
}
.BodyBoldGreenA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #008040;
}
.BodyLink {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
text-decoration: underline;

}
.BodyBoldLink {
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
text-decoration: underline;

}
.reportstyles {
font-family: Arial, Helvetica, sans-serif;
font-size: 9px;
font-style: normal;
font-weight: normal;
}
td {

font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
}
.BodyLinkA {
font-family: Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
text-decoration: underline;

}
.BodyBoldWhite {

font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: bold;
color: #FFFFFF;
}
.SecHedWhite {

font-family: Tahoma, Arial, Helvetica;
font-size: 12pt;
font-weight: bold;
color: #FFFFFF;
padding-bottom: 4px;
margin-bottom: 4px;
}
.BodyRed {

font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 10pt;
font-weight: normal;
color: #990000;
}

-->
</style>

<!-- If you are having difficulty seeing this mail or images in it, you can view it in your Web browser. Copy http://ct.itbusinessedge.com/dm?id=AFA2D22F89668BE6C4889369CA8BAED6 to the address field. -->

<div align="center">
<table width="660" border="0" cellspacing="0" cellpadding="0">
<tr>
<td width="281"><a href="http://ct.itbusinessedge.com/dm?id=AFA2D22F89668BE6C4889369CA8BAED6" class="SmallALink">View
in your Web browser.</a></td>
<td width="379"><div align="right"><a href="http://ct.itbusinessedge.com/t?ctl=D8E525:3C3C204" class="SmallALink">Edit
my e-mail account</a> | <a href="http://ct.itbusinessedge.com/bin/ftaf?id=AFA2D22F89668BE6C4889369CA8BAED6" class="SmallALink">Forward
to a Friend</a></div></td>
</tr>
</table>
</div>
<table width="600" border="0" align="center" cellpadding="1" cellspacing="0" bgcolor="#CCCCCC">
<tr>
<td><table width="635" border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<!-- REMOVE THE COUNT GIF BELOW -->
<td width="673" colspan="2" valign="top"> <table width=635 border=0 cellpadding=0 cellspacing=5>
<tr>
<td width="640" colspan="2" valign="middle"><b><font color="#333333" size="5" face="Tahoma, Arial, Helvetica"><a href="http://www.itbusinessedge.com/"><img src="http://www.ITBusinessEdge.com/reports/images/mcsmailheader2.gif" alt="MANAGING COMPLIANCE STANDARDS" width="630" height="75" border="0"></a><img src="http://www.ITBusinessEdge.com/reports/images/ed/mcs051020count.gif" width="1" height="1"></font></b></td>
</tr>
</table></td>
</tr>
<tr>
<td width="673" colspan="2"> <table width="100%" border="0" cellspacing="0" cellpadding="5">
<tr>
<td>
<div> <table width="100%" border="0" bgcolor="#FFFFCC">
<tr>
<td> <p><font size="2" face="Arial, Helvetica, sans-serif"><strong>Sponsor:
<a href="http://ct.itbusinessedge.com/t?ctl=D8E527:3C3C204"><font size="2" face="Arial, Helvetica, sans-serif">Nortel Networks</font></a></strong></font><br>
<font size="2" face="Arial, Helvetica, sans-serif">Discover an analysis
methodology for determining IP telephony TCO based on six cost categories.
It's a highly flexible way to uncover the hidden costs of telephony solutions
and it can be used to generate similar benchmarking for many different
sizes and types of deployment comparisons. <a href="http://ct.itbusinessedge.com/t?ctl=D8E527:3C3C204"><font size="2" face="Arial, Helvetica, sans-serif">Read
the free white paper today!</font></a></font></p>
</td>
</tr>
</table> </div>
</td>
</tr>
</table>
<table width="100%" height="73" border="0" cellpadding="5" cellspacing="0">
<tr>
<td width="99%"> <TABLE width="100%" border=0 cellPadding=0 cellSpacing=0>
<TR>
<TD width=248 vAlign=top> <table width="100%" border="0" cellpadding="3" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2" class="BodyBoldRed"><strong>Hot White
Papers</strong></td>
</tr>
<tr>
<td width="50%" valign="top" class="SmallBoldRed">
<table width="100%" border="0" cellspacing="0" cellpadding="1">
<tr>
<td><div align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E51B:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/ad/0091HHOT0001.gif" width="70" height="91" border="0"></a></div></td>
</tr>
<tr>
<td>
<div align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E51B:3C3C204" class="SmallLink">How to Determine IP Telephony TCO</a></div>
</td>
</tr>
</table></td>
<td width="50%" valign="middle"> <table border="0" cellpadding="1" cellspacing="0">
<tr>
<td valign="top" class="SmallBoldRed"><font size="1">&#8226;</font>
</td>
<td valign="top">
<div><a href="http://ct.itbusinessedge.com/t?ctl=D8E518:3C3C204" class="SmallLink">A VoIP Strategy for Unified Messaging</a></div>
</td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed"><font size="1">&#8226;</font></td>
<td valign="top">
<div><a href="http://ct.itbusinessedge.com/t?ctl=D8E509:3C3C204" class="SmallLink">Insights: SOA Readiness and Adoptions</a></div>
</td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed"><font size="1">&#8226;</font></td>
<td valign="top">
<div><a href="http://ct.itbusinessedge.com/t?ctl=D8E519:3C3C204" class="SmallLink">E-mail Archival Retrieval: Hours, Not Weeks</a></div>
</td>
</tr>
</table></td>
</tr>
<tr>
<td colspan="2" valign="top" class="SmallBoldRed"><div align="center">View
entire <a href="http://ct.itbusinessedge.com/t?ctl=D8E51F:3C3C204" class="SmallLink">Research
Library</a></div></td>
</tr>
</table></TD>
<TD width="8" vAlign=top> <p>&nbsp;</p></TD>
<TD width="384" vAlign=top> <table width="100%" border="0" cellspacing="0" cellpadding="1">
<tr>
<td colspan="2"> <span class="BodyBoldRed">Oct. 20,
2005</span><br> <span class="BodyBoldA">Implementing compliance software provides greater performance insight and improves business processes, most large companies believe.</span>
</td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="7"></td>
</tr>
<tr>
<td colspan="2" class="BodyBoldRed">Also in this Issue</td>
</tr>
<tr>
<td width="8" valign="top" class="SmallBoldRed"><font size="1">&#8226;</font></td>
<td width="542"><a href="#TI" class="BodyLinkA">Giuliani Offers Strategy on Identity Theft</a></td>
</tr>
<tr>
<td width="8" valign="top" class="SmallBoldRed"><font size="1">&#8226;</font></td>
<td><a href="#3Q" class="BodyLinkA">Delaware Supreme Court Rules in Favor of Anonymous Blogger in Defamation Claim</a></td>
</tr>
<tr>
<td width="8" valign="top" class="SmallBoldRed"><font size="1">&#8226;</font></td>
<td><a href="#BN" class="BodyLinkA">Will Sarbanes-Oxley Force Small Companies to Privatize?</a></td>
</tr>
</table></TD>
</TR>
</TABLE></td>
<td width="1%">&nbsp;</td>
</tr>
</table>
<table border="0" cellpadding="4" cellspacing="6">
<tr>
<td width="290" valign="top"> <div class="SecHed">Top Insights<br>
<hr width="298">
</div>
<!-- KR BEGIN TI -->
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E515:3C3C204" class="BodyBoldLink">Hyperion Reports Sarbanes-Oxley Compliance Fueling Improvements in Business Performance</a></div>
<div><span class="BodyBold">DMReview:</span> Rohm and Haas, a large chemicals producer, is using financial management software to assign financial reporting sign-off and responsibilities to appropriate organizational levels. The fact that financial data is well reviewed has helped make the company Sarbanes-Oxley compliant. An IDC study indicated that a large majority of companies, 88 percent, were anticipating improvements in financial management activities as well as overall business process performance as a result of Sarbox efforts.</div></td>
<!-- BEGIN CUT FOR SITE HTML -->
<td width="336" valign="top">
<div> <div align="center"><span class="SmallA">SPONSOR</span></div><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E528:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/ad/0019HSKY0049.gif" width="336" height="280" border="0" align="right"></a> </div>
</td>
<!-- END CUT -->
</tr>
</table>
<table width="100%" border="0" cellpadding="4" cellspacing="6">
<tr>
<td width="466" valign="top"> <table width="100%" border="0" cellspacing="6" cellpadding="6">
<tr>
<td width="7%">&nbsp;</td>
<td width="93%">
<div class="BodyBold">ADDITIONAL READING:</div>
<div><span class="BodyBold">BPM Magazine:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E511:3C3C204" class="BodyLink">Financial Consolidations: The Missing Piece in SOX Sustainability</a><br>
<span class="BodyBold">Sarbanes-Oxley Compliance Journal:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E517:3C3C204" class="BodyLink">Beyond Initial Compliance</a><br>
<span class="BodyBold">Finextra.com:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E523:3C3C204" class="BodyLink">U.S. Multinationals to Reinforce Technology for SOX Compliance</a></div></td>
</tr>
</table>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E508:3C3C204" class="BodyBoldLink">ECM: The New Strategic Imperative</a></div>
<div><span class="BodyBold">SDA-Asia:</span> Enterprise Content Management is emerging as a key set of technologies used to tackle compliance projects, as well as other strategic initiatives such as continuous process improvement and collaboration. ECM proposes to unify business content, processes and connectivity to facilitate information exchange and quickened response and decision time. ECM creates relationships between documents, Web pages, folders and the operations connected to them. This leads to better decision-making; it is this element that generates ROI and competitive advantage for organizations. ECM also helps with regulatory compliance by promoting accountability and reducing risk.</div>
<table width="100%" border="0" cellspacing="6" cellpadding="6">
<tr>
<td width="7%">&nbsp;</td>
<td width="93%"> <div class="BodyBold">ADDITIONAL READING:</div>
<div><span class="BodyBold">TechNewsWorld:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E505:3C3C204" class="BodyLink">The Future of E-Mail Archiving</a><br>
<span class="BodyBold">ADTmag.com:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E524:3C3C204" class="BodyLink">Content Management's Changing Story Line</a><br>
<span class="BodyBold">Computing:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E50C:3C3C204" class="BodyLink">E-Mail Archive to Integrate Applications</a></div></td>
</tr>
</table>
<!-- BEGIN CUT FOR SITE HTML -->
<table width="463" border="0" cellpadding="5" bgcolor="#FFFFCC">
<tr>
<td width="75%" bgcolor="#FFFFCC"><font size="2" face="Arial, Helvetica, sans-serif"><strong>Sponsor:
<a href="http://ct.itbusinessedge.com/t?ctl=D8E516:3C3C204"><font size="2" face="Arial, Helvetica, sans-serif">VoIP
Business Case Resource Kit</font></a></strong></font></td>
<td width="25%" bgcolor="#FFFFCC"><div align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E516:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/ad/logo-itbe.gif" width="88" height="31" border="0"></a></div></td>
</tr>
<tr>
<td colspan="2" bgcolor="#FFFFCC"><p align="left"><font color="#000000" size="3" face="Arial, Helvetica, sans-serif"><b>Understand,
Quantify and Explain the VoIP Opportunity</b></font><br>
<font size="2" face="Arial, Helvetica, sans-serif">Save
20 hours or more of your valuable time with our background
research, pro forma financial calculations, and ready-to-use
PowerPoint presentation. Make the right decision on
this critical technology and back it up!</font></p>
<p align="right"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><strong>&gt;
<a href="http://ct.itbusinessedge.com/t?ctl=D8E516:3C3C204"><font size="1" face="Verdana, Arial, Helvetica, sans-serif">Get
more info.</font></a></strong></font></p></td>
</tr>
</table>
<p></p>
<!-- END CUT -->
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E507:3C3C204" class="BodyBoldLink">Another Data Security Bill in the Works</a></div>
<div><span class="BodyBold">News.com:</span> Mike Castle (R.-Del.) says that he plans to introduce a revised version of a bill that he has been working on since February. The federal legislation would require all companies handling sensitive and personal information to secure the data, investigate breaches promptly, notify partners and law enforcement immediately in the event of a compromise, and offer free credit monitoring services to affected consumers. Rep. Castle's bill joins several efforts in the Senate, including a sweeping measure proposed by Senators Specter and Leahy which is thought to be heading for a vote in October. Castle says he will hold a hearing on his bill by the end of October.</div>
<table width="100%" border="0" cellspacing="6" cellpadding="6">
<tr>
<td width="7%">&nbsp;</td>
<td width="93%"> <div class="BodyBold">ADDITIONAL READING:</div>
<div><span class="BodyBold">Insurance Journal:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E50F:3C3C204" class="BodyLink">N.J. Toughens Identity Theft Protections for Consumers</a><br>
<span class="BodyBold">eWEEK:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E51D:3C3C204" class="BodyLink">Critics Doubt Effectiveness of California Anti-Phishing Law</a><br>
<span class="BodyBold">bizjournals:</span> <a href="http://ct.itbusinessedge.com/t?ctl=D8E50E:3C3C204" class="BodyLink">State Gets Tougher in Fight Against Online Criminals</a></div></td>
</tr>
</table>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E506:3C3C204" class="BodyBoldLink">Seven Steps to a Business Case</a></div>
<div><span class="BodyBold">Computerworld:</span> IT executives are increasingly being asked to build business cases for their IT initiatives. To develop an effective business case, the IT organization must understand business goals. A business case must forecast costs and savings, describe expected benefits and risks, and demonstrate how the project fits with the organization's strategic vision. The business case should be heavily laden with numbers, discussing project costs, maintenance expenses and returns on investments. It should also present alternative scenarios. The business case should also discuss nonfinancial factors, such as meeting compliance requirements. This may be at the core of the business case and the facts surrounding such factors must be fully explained.</div>
<p></p>
<div> <table width="465" border="0" cellpadding="5" bgcolor="#FFFFCC">
<tr>
<td width="133" align="center" valign="middle"> <div align="center"> <a href="http://ct.itbusinessedge.com/t?ctl=D8E529:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/ad/nortel-tco-cover.gif" width="133" height="173" border="0"></a></div></td>
<td colspan="2" valign="middle"> <div align="left">
<p><font color="#000000" size="2" face="Arial, Helvetica, sans-serif"><b>Special
Offer: <a href="http://ct.itbusinessedge.com/t?ctl=D8E529:3C3C204"><font size="2" face="Arial, Helvetica, sans-serif">Free
White Paper</font></a></b></font></p>
<p style="margin-bottom: 0;"><font color="#000000" size="3" face="Arial, Helvetica, sans-serif"><b>Understanding
the Total Cost of Ownership of IP Telephony Solutions</b></font><br>
<font size="2" face="Arial, Helvetica, sans-serif">In this study conducted
by an independent research and consulting group, the often-hidden costs
associated with IP telephony ownership are revealed. Discover this analysis
methodology for determining TCO based on six cost categories. It's highly
flexible and can be used to generate similar benchmarking for many different
sizes and types of deployment comparisons. <a href="http://ct.itbusinessedge.com/t?ctl=D8E529:3C3C204">
<font size="2" face="Arial, Helvetica, sans-serif">Check it out today</font></a>!</font></p>
</div></td>
</tr>
<tr>
<td height="2"></td>
<td width="145"></td>
<td width="149"></td>
</tr>
</table> </div>
<p><a name="TI"></a></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E510:3C3C204" class="BodyBoldLink">Giuliani Offers Strategy on Identity Theft</a></div>
<div align="left"><span class="BodyBold">Washington Times:</span>
Former New York City Mayor Rudolph Giuliani says the financial
industry should protect consumers from identity theft in ways
similar to cities preparing for terrorist attacks. The key
is to anticipate as much as possible, he advises. When Giuliani
arrived at ground zero on Sept. 11, 2001, he realized that
the city had no plans for what occurred. Instead, officials
improvised with parts of other disaster plans to figure out
a response. The lesson for the financial industry is to proactively
prepare for security breaches, he says. Other presenters at
the conference where Giuliani spoke noted that consumers who
entrust financial information to strangers are the industry's
biggest security risk.</div>
<p></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E514:3C3C204" class="BodyBoldLink">Spychips Sees an RFID Conspiracy</a></div>
<div align="left"><span class="BodyBold">Wired:</span>
Two consumer privacy rights advocates have authored a book, &quot;Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID,&quot; claiming that government and private business are colluding to install radio transmitters on many consumer products. If radio tags replace barcode labels, they say, consumers could be tracked anywhere. Companies like Philips, Procter and Gamble, Gillette, NCR and IBM, all at the core of the RFID industry, are conspiring with each other and with the federal government to follow consumers from their refrigerators to their medicine cabinets, according to these groups. Companies counter that RFID will be used only for purposes of supply chain management. The authors hope their book will galvanize support for new privacy laws covering RFID, much as Ralph Nader's &quot;Unsafe at Any Speed&quot; heralded safety requirements for automobile manufacturers.</div>
<div align="left" class="BodyBold"></div>
<p></p>
<table width="465" border="0" cellpadding="3" cellspacing="0" bgcolor="#FFFFCC">
<tr>
<td height="20" colspan="2" bgcolor="#990000" class="SecHedWhite">IT Marketplace</td>
</tr>
<tr>
<td width="50%" valign="top"><table width="100%" border="0" cellpadding="3" cellspacing="0" bgcolor="#FFFFCC">
<tr>
<td colspan="2" valign="top" class="BodyBoldRed">Hardware</td>
</tr>
<tr>
<td width="9" height="19" valign="top" class="SmallBoldRed">&#8226;</td>
<td width="213" valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52A:3C3C204" class="BodyLinkA">Data Privacy/Data Encryption Solutions</a></td>
</tr>
<tr>
<td height="19" valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52B:3C3C204" class="BodyLinkA">Dominion
Series - Digital KVM Console Access and Connectivity Solutions</a>
</td>
</tr>
<tr>
<td colspan="2" valign="top" class="BodyBoldRed">Software</td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226; </td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52C:3C3C204" class="BodyLinkA">WebFOCUS Query and Analysis Solutions (OLAP and Ad Hoc Reporting Tools)</a></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226; </td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52D:3C3C204" class="BodyLinkA">TransactionVision - Business Process Monitoring</a> </td>
</tr>
<tr>
<td colspan="2" valign="top"><span class="BodyBoldRed">Events</span></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226; </td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52E:3C3C204" class="BodyLinkA">The
Business Case for Business Rules</a> </td>
</tr>
<tr>
<td colspan="2" valign="top" class="BodyBoldRed">Publications</td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E52F:3C3C204" class="BodyLinkA">Implement Your Outsourcing Initiatives with These Process Templates</a> </td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226; </td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E530:3C3C204" class="BodyLinkA">All the Basics of IT Management</a></td>
</tr>
<tr>
<td colspan="2" valign="top" class="BodyBoldRed">&nbsp;</td>
</tr>
</table>
</td>
<td width="50%" valign="top"><table width="100%" border="0" cellpadding="3" cellspacing="0" bgcolor="#FFFFCC">

<tr>
<td colspan="2" valign="top" class="BodyBoldRed">White Papers </td>
</tr>
<tr>
<td width="9" valign="top" class="SmallBoldRed">&#8226;</td>
<td width="213" valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E531:3C3C204" class="BodyLinkA">Your E-Mail System: Liability or Asset? </a></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E532:3C3C204" class="BodyLinkA">Choosing the Right Disk-based Backup Solution</a></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E533:3C3C204" class="BodyLinkA">VoIP:
Creating a Strategy That Enables Future Voice Applications</a> </td>
</tr>

<tr>
<td colspan="2" valign="top" class="BodyBoldRed">Training & Tools</td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E534:3C3C204" class="BodyLinkA">Best Practices Guide Walks You Through IT Strategic Planning</a></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226; </td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E535:3C3C204" class="BodyLinkA">IT Operations Guide Perfect for IT and non-IT Managers</a></td>
</tr>
<tr>
<td valign="top" class="SmallBoldRed">&#8226;</td>
<td valign="top"><a href="http://ct.itbusinessedge.com/t?ctl=D8E536:3C3C204" class="BodyLinkA">Be Ready for a Disaster with this Best Practices Guide</a> </td>
</tr>
<tr>
<td colspan="2" valign="top" class="BodyBoldRed">IT Services <span class="BodyRed">(listings
available)</span></td>
</tr>
<tr>
<td colspan="2" valign="top"><span class="BodyBoldRed">Jobs</span> <span class="BodyRed">(listings
available)</span></td>
</tr>
</table></td>
</tr>
<tr>
<td colspan="2" valign="top"><table width="100%" border="0" cellspacing="0" cellpadding="8">
<tr>
<td class="BodyA">Tell the IT Business Edge audience of technology decision
makers about your product, service, event, or job. Click <a href="http://ct.itbusinessedge.com/t?ctl=D8E537:3C3C204" class="BodyLinkA">here</a>
to list it in the IT Marketplace!</td>
</tr>
</table></td>
</tr>
</table>
<p></p>
<!-- KR END TI -->
<div align="left" class="SecHed">3 QUESTIONS:<br>
Whipping Marketing into Shape<br>
<hr width="480">
</div>
<!-- KR BEGIN 3Q AND COPY HEADLINE OVER -->

<div align="left" class="BodyItal">With Chetan Saiya, founder,
chairman and CEO of Assetlink, a provider of Marketing Operations
Management solutions. Prior to starting Assetlink, Saiya was
CEO of MediaWay, a multimedia database management company
that he founded, and Tandem Computers.</div>
<p></p>
<div align="left" class="Body"><span class="BodyBold">Question:</span>
What problems do marketing operations present to compliance efforts?<br>
<span class="BodyBold">Saiya:</span> With regard to Sarbanes-Oxley compliance, the first thing everyone talks about is the audit process. When auditors come into a company, the first thing they do is to ask for an inventory of processes. That's fine when it comes to finance, manufacturing, human resources or sales. But marketing usually does not have processes. The term &quot;marketing process&quot; is an oxymoron. Without formal processes, the auditors can't examine them or suggest any changes. At the end of the auditing process, the auditors pronounce the company compliant, without having examined a significant component of the company, i.e. marketing. The rest of the company, such as payroll or raw materials, has well defined expenses. In marketing, 80 percent to 90 percent [of expenses] are ad hoc and there are no standard pricing or procurement processes.</div>
<p></p>
<div align="left" class="Body"><span class="BodyBold">Question:</span>
How large of a problem could this be?<br>
<span class="BodyBold">Saiya:</span> In Global 2000 companies, the marketing budget can vary from around 10 percent of expenses to about 40 percent of expenses in areas like pharmaceuticals. The way marketing operations are managed, companies have no idea of the marketing costs accrued in a given month. There is a likely variance of 20 percent and, when you look at the overall expenses of a corporation, this can result in a 3 percent to 8 percent variance in the accuracy of overall financial results. So you have CEOs and CFOs signing in blood that the financial results are accurate. But shareholders and stakeholders may sue them when they have to restate their financial statements. A 5 percent variance can easily gobble up the net profits of many a corporation.<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;I know of one case in which the CFO was examining the results of a Sarbanes-Oxley audit and noticed there were no suggested changes at marketing. He asked the auditors, &quot;Does this mean they're doing a great job?&quot; The response was that the auditors didn't even look at marketing because they had no processes to review. Meanwhile, the company had to rush to get compliant and start putting systems in place because they were about to make a secondary stock offering.</div>
<p></p>
<div align="left" class="Body"><span class="BodyBold">Question:</span>
What's the solution to this problem?<br>
<span class="BodyBold">Saiya:</span> The first step is to mandate that marketing is not an ad hoc, creative activity but is a form of corporate activity that needs institutionalized processes in terms of how you plan, how you budget, how you expense and how you execute marketing programs. Once you set up those processes, you need to put systems in place to manage those processes. Just as accounting uses ERP systems and human resources has its systems, marketing needs marketing operations management systems that implement processes, integrate with the rest of the enterprise and provide a more accurate picture of forecasts, activities, liabilities and spends. Besides helping with compliance issues, these systems can help streamline marketing operations, dramatically reduce error rates, and promote efficiency by eliminating duplication and spreading marketing campaigns out in a proper fashion.<br>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;By having plans and budgets in the system, you can calculate the ROI for different marketing campaigns and determine whether or not to repeat such a campaign in the future. Having well-defined marketing processes allows for the automation of those processes. Marketing information can be aggregated in one place and an audit trail can be established. This is important from a compliance point of view but can also provide information by which course corrections can be effected. It also expedites the pace at which can you do things and enables more effective marketing campaigns.</div>
<p></p>
<table width="464" border="0">
<tr>
<td width="3" bgcolor="#008040">&nbsp;</td>
<td><div align="left"><font color="#008040" size="2" face="Arial, Helvetica, sans-serif"><strong>Also
from IT Business Edge:</strong> <a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=11"><font size="2" face="Arial, Helvetica, sans-serif">Voice
& Data Convergence</font></a> </font><br>
<font color="#008040" size="1" face="Arial, Helvetica, sans-serif">Voice
& Data Convergence examines the strategic and tactical
implications of emerging IP telephony technologies,
from VoIP services to advanced CRM systems to security
considerations. Find out what every IT decision maker
should know. <a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=11"><font size="1" face="Arial, Helvetica, sans-serif">Click
here to sign up!</font></a></font></div></td>
</tr>
</table>
<p></p>
<!-- KR END 3Q -->
<div align="left" class="SecHed">By the Numbers<br>
<hr>
</div>
<!-- KR BEGIN BN -->
<div align="left" class="BodyBoldRedItal">20 percent</div>
<div align="left">Proportion of U.S. employers that have had e-mail subpoenaed in lawsuits or by regulators.</div>
<div align="left" class="Small"><span class="SmallBold">Source:</span>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E505:3C3C204" class="SmallLink">TechNewsWorld</a></div>
<p></p>
<div align="left" class="BodyBoldRedItal">75 percent</div>
<div align="left">Proportion of companies making technology changes targeted at the control environment and compliance processes, according to a PricewaterhouseCoopers study.</div>
<div align="left" class="Small"><span class="SmallBold">Source:</span>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E523:3C3C204" class="SmallLink">Finextra.com</a></div>
<p></p>
<div align="left" class="BodyBoldRedItal">$500,000</div>
<div align="left">Civil penalty per instance of identity theft that could be levied against ISPs and Web hosting services under California's new anti-phishing law.</div>
<div align="left" class="Small"><span class="SmallBold">Source:</span>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E50B:3C3C204" class="SmallLink">eWEEK</a></div>
<p></p>
<!-- KR END BN -->
<div align="left" class="SecHed">Breaking Headlines<br>
<hr>
</div>
<!-- KR BEGIN BH -->
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E512:3C3C204" class="BodyBoldLink">Biometric ATMs Not Being Used in U.S.</a></div>
<div align="left"><span class="BodyBold">BusinessWeek:</span>
Costs and privacy concerns are preventing U.S. banks from implementing iris scanning technology at ATMs, although the technology is being used elsewhere. In Colombia, biometrics is used in lieu of ATM cards at the fifth-largest bank in that country. The technology has matured to the point where instances of undetectable fingerprints have fallen from 30 percent to 2 percent. A Gartner analyst says biometrics is the most secure form of authentication because it is the hardest to imitate and duplicate. The ultimate utility of biometrics, according to an industry official, is to eliminate the PIN so that criminals no longer have anything to steal.</div>
<p><a name="3Q"></a></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E51C:3C3C204" class="BodyBoldLink">Delaware Supreme Court Rules in Favor of Anonymous Blogger in Defamation Claim</a></div>
<div align="left"><span class="BodyBold">Law.com:</span>
A local politician who sought the name of anonymous bloggers who trashed him has been shot down by the Delaware Supreme Court. The decision came as part of a defamation case brought by a town councilman against the bloggers. The court overturned a lower court ruling which ordered an Internet service provider to provide the identities of four anonymous posters to a blog. The court found anonymous Internet speech similar to anonymous political pamphleteering, a practice protected under the free speech provisions of the First Amendment to the U.S. Constitution. A claimant must offer strong proof of defamation in order to unmask an anonymous Internet poster, the Delaware Supreme Court ruled, and the lower court set that bar too low.</div>
<p></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E51A:3C3C204" class="BodyBoldLink">Private Sector Fights Back Against Phishing</a></div>
<div align="left"><span class="BodyBold">NewsFactor Network:</span>
Banks and other companies taking advantage of the online channel are becoming more proactive in protecting their customers, according to a Canadian business executive. This comes as companies realize that law enforcement has assigned a low priority to fighting online fraud. When notified that a phishing attack is occurring, these businesses use private sources to locate the originating server and shut down the illegal Web site. In addition, counter-phishing consultants set up fake accounts to track the final use of stolen data, and provide law enforcement with evidence for prosecution.</div>
<p><a name="BN"></a></p>
<!-- KR END BH -->
<div align="left" class="SecHed">Emerging Trends<br>
<hr>
</div>
<!-- KR BEGIN ET -->
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E51E:3C3C204" class="BodyBoldLink">Will Sarbanes-Oxley Force Small Companies to Privatize?</a></div>
<div align="left"><span class="BodyBold">Sarbanes-Oxley Compliance Journal:</span>
Small- and mid-sized publicly traded companies are having difficulty complying with Sarbanes-Oxley, largely because they have fewer in-house resources to bring to bear on compliance activities and therefore must spend more on compliance efforts. The complexity of Sarbanes-Oxley compliance has also caused auditing costs to increase. Companies with market capitalization of $5 billion or more spend an average of .03 percent of revenue on compliance, while companies with market capitalization of $100 million or less are spending an average of 1.3 percent. Some small companies are complaining that the burden of compliance will force them go private. Within a year after Sarbanes-Oxley went on the books, de-listing activity increased by 30 percent. The implications of these difficulties mean that fewer companies will seek to go public in the future. Since companies generally go public when they are seeking a capital infusion to fuel growth, the trend could result in stifled innovation.</div>
<p></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E50A:3C3C204" class="BodyBoldLink">Tipping the Compliance Scale</a></div>
<div align="left"><span class="BodyBold">CIO.com Asia:</span>
Smart CIOs are beginning to get their heads above the drudgery of specific compliance details and are taking a more holistic approach. Experts say executives charged with keeping their companies compliant should take a macro view to make sure that the enterprise stays in line with company policies and procedures. At Chartered Semiconductor Manufacturing, the CIO shares the chief responsibility for Sarbanes-Oxley compliance with the CFO. This reflects the recognition of the interrelationship between IT and financial reporting and the pervasive effect IT has on company processes. Chartered Semiconductor boasts a dedicated team of IT and business process specialists who have been awarded adequate resources as well as management oversight and a well-defined project plan. The starting point of a holistic compliance plan is to align compliance needs with business objectives and priorities.</div>
<p></p>
<div align="left" class="BodyBold"><a href="http://ct.itbusinessedge.com/t?ctl=D8E50D:3C3C204" class="BodyBoldLink">IM Use is Booming in Business</a></div>
<div align="left"><span class="BodyBold">Enterprise IT Planet:</span>
Instant messaging is expected to continue to grow as a substantial business collaboration application, according to IDC research. IDC expects the enterprise IM market to grow from $315 million in 2005 to $736 million in 2009. Sales of EIM applications jumped 37 percent in 2004 over 2003. If companies are recognizing the utility of IM, then compliance and security considerations provide a major countervailing headache. Regulations such as HIPAA, Sarbanes-Oxley and SEC regulation 17A-4 require businesses to store digital information, prompting strong growth in the security and management software end of the EIM market. Viruses spreading through instant messaging are also a worry, and vendors such as FaceTime, IMLogic and Akonix are integrating their products with those of EIM market leaders to defend against an increase in IM threats.</div>
<p></p>
<!-- KR END ET -->
<table width="100%" border="0" cellspacing="0" cellpadding="4">
<tr>
<td width="64%" class="SmallBold">IT Business Edge: Managing
Compliance Standards<br> </td>
<td width="36%" class="SmallBold"><div align="right">Issue
42, Vol. 2</div></td>
</tr>
<tr>
<td colspan="2"><span class="SmallBold">DISCLAIMER:</span>
<span class="SmallA">At the time of publication, all links
in this e-mail functioned properly. However, since many
links point to sites other than itbusinessedge.com, some
links may become invalid as time passes.</span></td>
</tr>
<tr>
<td colspan="2" class="SmallA">This e-mail is sent by: NarrowCast
Group, LLC, 124 N.First St., Louisville, KY 40202</td>
</tr>
<tr>
<td colspan="2"><div align="center"><span class="SmallA">Copyright
&copy;2003-2005 NarrowCast Group, LLC. All Rights Reserved.<br>
</span></div></td>
</tr>
</table></td>
<td width="160" align="center" valign="top">
<p><table width="15" border="0" cellspacing="0" cellpadding="0">
<tr>
<td>
<table width="158" border="0" cellspacing="0" cellpadding="3">
<tr>
<td height="21" bgcolor="#990000" class="BodyBoldWhiteA">Hot Solutions</td>
</tr>
</table>
<table width=158 border=0 cellpadding=0 cellspacing=4 bgcolor="#F0F0F0">
<tr>
<td width="9" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>

<td width="138" valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E538:3C3C204" class="SmallLink">IronMail
Secure Anti-Virus Gateway</a></td>
</tr>
<tr>
<td width="9" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E539:3C3C204" class="SmallLink">Citrix
Access Gateway Universal SSL VPN Appliance</a></td>
</tr>
<tr>
<td width="9" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E53A:3C3C204" class="SmallLink">Adonix
X3 ERP Manufacturing, Distribution and Supply Chain Management</a></td>
</tr>
<tr>
<td width="9" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top> <a href="http://ct.itbusinessedge.com/t?ctl=D8E53B:3C3C204" class="SmallLink">ViewWise
Document Management Solutions</a></td>
</tr>
<tr>
<td valign=top align=middle colspan=2> </td>
</tr>
<tr>
<td valign=top align=middle colspan=2><div align="center"><span class="SmallBoldRed">Search
entire</span><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E53C:3C3C204" class="SmallBoldLink">IT
Solution Directory</a></div></td>
</tr>
<tr>
<td valign=top align=middle colspan=2><p align="center"><span class="SmallBold">powered
by</span><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E53D:3C3C204"><img height=26 src="http://knowledgereports.itbusinessedge.com/images/ks_logo_139x26.gif" width=139 border=0></a></p></td>
</tr>
</table>
</td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="#999999">
<tr>
<td> <table width="100%" border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed">IT Best Practices</span><br>
<span class="SmallBoldRed">Guides and Templates</span></td>
</tr>
<tr>
<td width="32"><a href="http://ct.itbusinessedge.com/t?ctl=D8E53E:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a><br>
</td>
<td width="116"><p align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E53E:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/info-tech-strategic-ca.gif" width="100" height="119" border="0"></a><a href="http://ct.itbusinessedge.com/t?ctl=D8E53E:3C3C204" class="BodyLinkA"><br>
Strategic IT Planning and Governance</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E53F:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-new.gif" width="30" height="30" border="0"></a></td>
<td><p> <a href="http://ct.itbusinessedge.com/t?ctl=D8E53F:3C3C204" class="BodyLinkA">Building
a Comprehensive Disaster Recovery Plan</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E540:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a></td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E540:3C3C204" class="BodyLinkA">IT
Operations Guide</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><p> <a href="http://ct.itbusinessedge.com/t?ctl=D8E541:3C3C204" class="BodyLinkA">Optimizing
Your IT Infrastructure</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><p> <a href="http://ct.itbusinessedge.com/t?ctl=D8E542:3C3C204" class="BodyLinkA">Securing
Your IT Environment</a></p></td>
</tr>
</table></td>
</tr>
</table></p>

<p><a href="http://ct.itbusinessedge.com/t?ctl=D8E543:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/ad/0049HSTA0001.gif" width="158" height="260" border="0"></a></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="999999">
<tr>
<td width="157"> <table width="100%" border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed"> Policies and Procedures</span><br>
<span class="SmallBoldRed">IT Operations Essentials</span></td>
</tr>
<tr>
<td width="33"><a href="http://ct.itbusinessedge.com/t?ctl=D8E540:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a></td>
<td width="110"><p align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E540:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/prosoft-itops-ca.gif" width="80" height="64" border="0"></a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E540:3C3C204" class="BodyLinkA">IT
Operations Guide</a></p></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E544:3C3C204" class="BodyLinkA">IT
Planning Bundle</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E545:3C3C204" class="BodyLinkA">2005
IT Compensation Study</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E546:3C3C204" class="BodyLinkA">Strategic
Outsourcing Framework</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E547:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-new.gif" width="30" height="30" border="0"></a></td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E547:3C3C204" class="BodyLinkA">Outsourcing
Process Templates </a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E548:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-save.gif" width="30" height="30" border="0"></a></td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E548:3C3C204" class="BodyLinkA">PortfolioStep
Portfolio Management System</a></td>
</tr>
</table></td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="999999">
<tr>
<td> <table width="100%" border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed"> Training Products</span><br>
<span class="SmallBoldRed">IT and Management Skills</span></td>
</tr>
<tr>
<td width="33"><a href="http://ct.itbusinessedge.com/t?ctl=D8E54A:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a></td>
<td width="110"><p align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E54A:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/mdecollection-ca.gif" width="94" height="100" border="0"></a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E54A:3C3C204" class="BodyLinkA">IT
Manager Development Series</a></p></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E54B:3C3C204" class="BodyLinkA">IT
Management Essentials Bundle</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E54C:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-save.gif" width="30" height="30" border="0"></a></td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E54C:3C3C204" class="BodyLinkA">IT
Management Development Mega Pack</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E548:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-save.gif" width="30" height="30" border="0"></a></td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E548:3C3C204" class="BodyLinkA">PortfolioStep
Portfolio Management System</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E546:3C3C204" class="BodyLinkA">Strategic
Outsourcing Framework</a></td>
</tr>
</table></td>
</tr>
</table></p>

<p><table width="160" border="1" cellpadding="2" cellspacing="0" bordercolor="#FFFFFF">
<tr>
<td width="158"> <div align="center" class="SmallA">SPONSORED RESOURCES</div></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td bgcolor="#FFDFDF"><a href="http://ct.itbusinessedge.com/t?ctl=D8E54F:3C3C204" class="BodyBoldLinkA">
Free 30-day Trial from Intuit QuickBase</a><br>
<span class="BodyA">Manage projects, sales, IT and more. Control access
to data. Perfect for mid-size and large companies.</span></td>
</tr>
<tr>
<td><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="1"></td>
</tr>
<tr>
<td bgcolor="#FFDFDF"><a href="http://ct.itbusinessedge.com/t?ctl=D8E550:3C3C204" class="BodyBoldLinkA">
Your E-Mail System: Asset or Liability?</a><br>
<span class="BodyA"> White paper explains how ILM solutions can help you
face the most pressing need in regulatory messaging compliance.</span></td>
</tr>
<tr>
<td><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="1"></td>
</tr>
<tr>
<td bgcolor="#FFDFDF"><a href="http://ct.itbusinessedge.com/t?ctl=D8E551:3C3C204" class="BodyBoldLinkA">Add
Accountability & Visibility to Projects</a><br>
<span class="BodyA">Check out the advantages
of a Web-based collaboration platform geared for any budget.</span></td>
</tr>
<tr>
<td><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="1"></td>
</tr>
<tr>
<td bgcolor="#FFDFDF"><a href="http://ct.itbusinessedge.com/t?ctl=D8E552:3C3C204" class="BodyBoldLinkA">
Why More Bandwidth Won't Save Slow WANs</a><br>
<span class="BodyA">White paper overturns common belief that extra bandwidth
will correct poor performing WAN apps.</span></td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="999999">
<tr>
<td> <table border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed"> Business Case Kits</span><br>
<span class="SmallBoldRed">Background and Templates</span></td>
</tr>
<tr>
<td width="33"><a href="http://ct.itbusinessedge.com/t?ctl=D8E553:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a></td>
<td width="109"><p align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E553:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/itbe-voip-ca.gif" width="74" height="100" border="0"></a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E553:3C3C204" class="BodyLinkA">VoIP
Business Case Resource Kit</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E554:3C3C204" class="BodyLinkA">Spam
Filtering Business Case Resource Kit</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E555:3C3C204" class="BodyLinkA">Blade
Server Business Case Resource Kit</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E556:3C3C204" class="BodyLinkA">CaseBuilder
for IT Initiatives</a></td>
</tr>
</table></td>
</tr>
</table></p>

<p><table width="158" border="0" cellspacing="0" cellpadding="5">
<tr>
<td bgcolor="#003366"><span class="BodyBoldWhite">Research<br>
Consultant Rates</span><br>
<span class="SmallBoldWhite">Free for Subscribers!</span></td>
</tr>
<tr>
<td bgcolor="#F0F0F0"> <span class="BodyA">Don't budget IT projects in the
dark! Find out what contractors are charging for the skills you need by
querying our database of more than 12,000 consultants and firms.</span>
<p><a href="http://ct.itbusinessedge.com/t?ctl=D8E557:3C3C204" class="BodyLinkA">Click
here</a> <span class="BodyA">to begin your research now!</span></p></td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="999999">
<tr>
<td> <table width="100%" border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed"> IT Security</span><br> <span class="SmallBoldRed">Guidelines
and Tools</span></td>
</tr>
<tr>
<td width="33"><div align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E53F:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-new.gif" width="30" height="30" border="0"></a></div></td>
<td width="110"><p align="center"> <a href="http://ct.itbusinessedge.com/t?ctl=D8E53F:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/info-tech-disaster-ca.gif" width="112" height="153" border="0"></a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E53F:3C3C204" class="BodyLinkA">Building
a Comprehensive Disaster Recovery Plan</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><p><a href="http://ct.itbusinessedge.com/t?ctl=D8E558:3C3C204" class="BodyLinkA">Security
Manual Template</a> </p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E559:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/prod-best.gif" width="30" height="41" border="0"></a></td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E559:3C3C204" class="BodyLinkA">Disaster
Recovery Plan Process Kit</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td class="BodyA"><a href="http://ct.itbusinessedge.com/t?ctl=D8E542:3C3C204" class="BodyLinkA">Securing
Your IT Environment Best Practices Methodology</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E55A:3C3C204" class="BodyLinkA">
Firewalls: The InfoWorld Test Center Product Guide</a></td>
</tr>
</table></td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="1" cellspacing="0" bgcolor="999999">
<tr>
<td> <table width="100%" border="0" cellpadding="2" cellspacing="0" bgcolor="#FFFFFF">
<tr>
<td colspan="2"><span class="BodyBoldRed"> Info-Tech Research</span><br>
<span class="SmallBoldRed">Premium Analyst Reports</span></td>
</tr>
<tr>
<td width="22%">&nbsp;</td>
<td width="78%"> <p align="center"><a href="http://ct.itbusinessedge.com/t?ctl=D8E55B:3C3C204"><img src="http://www.itbusinessedge.com/reports/images/store/info-tech-secoutsource-ca.jpg" width="90" height="117" border="0"></a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E55B:3C3C204" class="BodyLinkA">How
to Select a Security Outsourcer</a></p></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E55C:3C3C204" class="BodyLinkA">A
Strategy for CRM Selection</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E55D:3C3C204" class="BodyLinkA">
Dissecting .NET for for IT Decision Makers</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><a href="http://ct.itbusinessedge.com/t?ctl=D8E55E:3C3C204" class="BodyLinkA">
Enterprise Wireless Networking: A View to the Future</a></td>
</tr>
<tr>
<td colspan="2"><img src="http://www.itbusinessedge.com/reports/images/pix_trans.gif" width="1" height="6"></td>
</tr>
<tr>
<td>&nbsp;</td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E55F:3C3C204" class="BodyLinkA">Linux
on the Desktop</a></td>
</tr>
<tr>
<td colspan="2"><font size="1" face="Arial, Helvetica, sans-serif"><img src="/reports/images/pix_trans.gif" width="1" height="6"></font></td>
</tr>
<tr>
<td>&nbsp;</td>
<td> <a href="http://ct.itbusinessedge.com/t?ctl=D8E560:3C3C204" class="BodyLinkA">
Portals: Separating Myth from Reality</a></td>
</tr>
</table></td>
</tr>
</table></p>

<p><table width="15" border="0" cellspacing="0" cellpadding="0">
<tr>
<td><table width="158" border="0" cellspacing="0" cellpadding="3">
<tr>
<td height="21" bgcolor="#990000" class="BodyBoldWhiteA">Find Related
Technology Solutions</td>
</tr>
</table>
<table border=0 cellpadding=0 cellspacing=4 bgcolor="#F0F0F0">
<tbody>
<tr>
<td width="6" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td width="140" valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E561:3C3C204" class="SmallLink">Compliance
Management/Sarbanes-Oxley Compliance</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E562:3C3C204" class="SmallLink">Information
Lifecycle Management</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E563:3C3C204" class="SmallLink">Risk
Management</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E564:3C3C204" class="SmallLink">Vulnerability
Assessment</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E565:3C3C204" class="SmallLink">Access
Control</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E566:3C3C204" class="SmallLink">Storage
Management</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E567:3C3C204" class="SmallLink">Database
Administration</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E568:3C3C204" class="SmallLink">Data
Warehousing</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E569:3C3C204" class="SmallLink">Data
Privacy</a></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign=top><a href="http://ct.itbusinessedge.com/t?ctl=D8E56A:3C3C204" class="SmallLink">Electronic
Medical Records</a></td>
</tr>
<tr>
<td valign=top align=middle colspan=2> </td>
</tr>
<tr>
<td valign=top align=middle colspan=2><div align="center"><span class="SmallBoldRed">Search
entire</span><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E56B:3C3C204" class="SmallBoldLink">IT
Solution Directory</a></div></td>
</tr>
<tr>
<td valign=top align=middle colspan=2><p align="center"> <span class="SmallBold">powered
by</span><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E56B:3C3C204"><img height=26 src="http://www.itbusinessedge.com/reports/images/ks_logo_139x26.gif" width=139 border=0></a>
</p></td>
</tr>
</tbody>
</table></td>
</tr>
</table></p>

<p><table width="158" border="0" cellpadding="3" cellspacing="0">
<tr bgcolor="#003366">
<td height="39" colspan="2" class="BodyBoldWhiteA">Find Related<br>
IT Contract Resources</td>
</tr>
<tr>
<td colspan="2" valign="top" bgcolor="#F0F0F0" class="Small">Find consultants
and contractors with the skills you need in your area!</td>
</tr>
<tr>
<td width="8" valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td width="138" valign="top" bgcolor="#F0F0F0"> <a href=
"http://ct.itbusinessedge.com/t?ctl=D8E56C:3C3C204"
class="SmallLink">Sarbanes-Oxley</a> </td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign="top" bgcolor="#F0F0F0"> <a href="http://ct.itbusinessedge.com/t?ctl=D8E56D:3C3C204" class="SmallLink">HIPAA</a><span class="Small">:
Peoplesoft, SAP, etc.</span></td>
</tr>
<tr>
<td valign="top" bgcolor="#F0F0F0" class="SmallBoldRed">&#8226;</td>
<td valign="top" bgcolor="#F0F0F0"> <a href="http://ct.itbusinessedge.com/t?ctl=D8E56E:3C3C204" class="SmallLink">Risk
Based Audit</a></td>
</tr>
<tr valign="bottom" bgcolor="#F0F0F0">
<td colspan="2" class="SmallBoldRed"> <div align="center">Search entire<br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E56F:3C3C204" class="SmallBoldLink">Contractor
Database</a> <br>
</div></td>
</tr>
<tr valign="bottom">
<td colspan="2" bgcolor="#F0F0F0" class="SmallBoldRed"><div align="center"><img src="http://www.ITBusinessEdge.com/reports/images/pix_trans.gif" width="120" height="1">
<a href="http://ct.itbusinessedge.com/t?ctl=D8E570:3C3C204"><img src="http://www.ITBusinessEdge.com/reports/images/hotgigslogo.gif" width="88" height="30" border="0" align="top"></a></div></td>
</tr>
<tr valign="bottom">
<td colspan="2" bgcolor="#F0F0F0" class="Small"><div align="center">Get listed
now!<br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E571:3C3C204
" class="SmallLink">Consultants</a> or <a href="http://ct.itbusinessedge.com/t?ctl=D8E572:3C3C204" class="SmallLink">
Firms</a></div></td>
</tr>
</table></p>
<table width="155" border="0" cellspacing="2" cellpadding="6">
<tr>
<td align="left" valign="top" bgcolor="e8e8e8"> <div class="SecHed">Weekly
Reports<br>
<hr>
</div>
<div class="SmallA">Sign up for these additional weekly
e-mail reports to get the best return on your company's
technology and talent.<br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=0" class="SmallALink">Maximizing
IT Investments</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=1" class="SmallALink">Aligning
IT & Business Goals</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=2" class="SmallALink">Integrating
the Enterprise</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=4" class="SmallALink">Fortifying
Network Security</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=5" class="SmallALink">Empowering
a Mobile Workforce</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=6" class="SmallALink">Optimizing
Infrastructure</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=8" class="SmallALink">Outsourcing
for Strategic Advantage</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=10" class="SmallALink">Leveraging
Open Source</a><br>
<a href="http://ct.itbusinessedge.com/t?ctl=D8E526:3C3C204&email=victor7@bizanalyst.net&pubno=11" class="SmallALink">Voice
& Data Convergence</a><br>
</div></td>
</tr>
</table>
<p></p>
<table width="155" border="0" cellspacing="0" cellpadding="0">
<tr>
<td><div class="SecHed">About the Editor<br>
<hr>
</div>
<table width="100%" border="0">
<tr>
<td><font size="1" face="Arial, Helvetica, sans-serif">Peter
Buxbaum has been writing about business, technology,
and law for 12 years. He has published over 1,000
articles in publications such as Fortune, Forbes,
Chief Executive, Computerworld, InformationWeek,
and dozens of others. He earned a law degree from
Temple University, studied economics at Columbia
University, and taught seminars in international
business at Penn State University. <br>
He can be reached at <a href="mailto:editorial@itbusinessedge.com"><font size="1" face="Arial, Helvetica, sans-serif">editorial@itbusinessedge.com</font></a>.<br>
</font></td>
</tr>
</table></td>
</tr>
</table></td>
</tr>
</table></td>
</tr>
<!-- BEGIN CUT FOR SITE HTML -->
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td><div align="center" class="Small"><a href="http://ct.itbusinessedge.com/t?ctl=D8E522:3C3C204" class="SmallLink">Privacy
Policy</a> &#8226; <a href="http://ct.itbusinessedge.com/t?ctl=D8E525:3C3C204" class="SmallLink">Manage
Subscriptions</a> &#8226; <a href="http://www.itbusinessedge.com/unsubscribereport.aspx?email=victor7@bizanalyst.net&pubno=9" class="SmallLink">Unsubscribe</a>
&#8226; <a href="http://ct.itbusinessedge.com/t?ctl=D8E520:3C3C204" class="SmallLink">Contact
Us</a> &#8226; <a href="http://ct.itbusinessedge.com/t?ctl=D8E521:3C3C204" class="SmallLink">
How to Advertise</a> &#8226; <a href="http://ct.itbusinessedge.com/t?ctl=D8E513:3C3C204" class="SmallLink">Back
Issues</a></div></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<!-- END CUT -->
</table>
</td>
</tr>
</table>
</body>

<img src="http://ct.itbusinessedge.com/t?c=212116&r=383&l=9190&t=10&s=63160836" width=1 height=1 border=0>

<img src="http://itbe.whatcounts.com/sf?r=383&l=9190&s=63160836&f=2" width=1 height=1 border=0>
</html>

0 Comments:

Post a Comment

<< Home