Network consultants and value-added resellers looking for more business (and who isn’t?) should click over to T1Rex for an introduction to the VARNetwork. In short, the VARNetwork is a database of value-added resellers and network consultants for business owners seeking network services and products. If you’re a VAR or consultant, it’s free to get listed in the database. The catch is that you give a little back to the VARNetwork after you complete a project that came from a VARNetwork lead, and those VARs that agree to give more rank higher in the system. Still, it may be worth investigating. If being listed in the VARNetwork doesn’t bring in any leads, you’re only out the time it took to register your company.
In an article on SearchSecurity.com, Stephen Toulouse, senior product manager for Microsoft’s Security Technology Unit, defends Microsoft’s foray into the security market and claims that it will have no impact on the life of other security vendors:
“I disagree with those who say our security moves are endangering the future of independent security vendors,” he said. “The threat landscape is always changing and I don’t agree that individual companies will go away.”
While Microsoft is doing right by getting serious about security, the company’s execs are being short-sighted if they think it won’t have an impact on a market its products helped create — not to mention Microsoft’s past history with squelching the competition (Remember Netscape?). Rather than arguing a moot point, MS should be reminding its critics that it’s attempting to give them what they wanted in the first place — a more secure product. Regardless of how that security is built in to MS products, it’s likely to impact the vendors who built their business around securing them. Denying that is only going to make the market more suspicious of Microsoft’s motives.
If you’re one to bet on the success of new technology and the potential ruin of the old (and your presence in the reseller business is evidence enough that you are), put a few bucks on the tubercular demise of Blockbuster and the rest of the walk-in video rental industry.
That’s great news for those of us who don’t have the patience to wait for Netflix to deliver a movie and would rather eat burned popcorn from a malfunctioning microwave while watching reruns of Full House than step into another Blockbuster.
It’s also good for those of us who think On Demand would be great if it ever had enough Supply. Two new movies a week doesn’t provide a ton of selection, you know? So downloadable is the way to go.
Sure, there are the tiny problems that go along with any new approach. “What are you going to watch it on?” asks one colleague, whose imagination is unfortunately limited to what is technically possible, or at least practical. Handheld video units like Apple’s own iPod don’t have enough storage or a big enough screen for a full-length movie. Laptops it is, at least for now.
Hewlett-Packard announced today that Patricia Dunn, who chairs its board of directors, will resign and be replaced by CEO Mark V. Hurd, who will assume both titles.
Her resignation follows revelation of the methods HP investigators used to try to uncover the source of information leaks to the press from a member of the board of directors. The leak involved a CNET story describing a days-long retreat taken by top HP executives and board members to plan strategy for the coming months.
Dunn did launch the investigation, after deciding the leaked information could affect the price of HP’s stock, but did not supervise it directly because — as a board member — she was a possible target of the investigation.
Long-serving board member George A. Keyworth II, who confirmed that he was the source of the leaks, also resigned.
Among other methods, the investigators — some of whom worked directly for HP and others who were contractors — used a technique euphemized as “pretexting” to get access to phone records of HP board members and several reporters. Pretexters call phone companies and lie about their identities in an effort to have the otherwise-private phone records of a target given to them.
Dunn apologized in a published statement that said, in part: “Unfortunately, the investigation, which was conducted with third parties, included certain inappropriate techniques. These went beyond what we understood them to be, and I apologize that they were employed.”
In another published statement, Hurd promised he would take “action to ensure that inappropriate investigative techniques will not be employed again. They have no place in H.P.”
No one has ever accused major IT vendors of being role models. Microsoft gets the most public heat, but it’s far from the most loathed, or most unethical, in the business. Resellers, whose reward for having built a thriving market for some new product is to have the largest customers stolen by a direct-sales force more interested in bonuses than either the reputation or long-term growth of the products they sell.
Every once in a while someone pulls a real doozy, though; the kind of diabolity you’d never believe of an otherwise respectable company. Something so contemptible you’re sure the story has to have been exaggerated by a competitor. No one in their right mind would have done something like that, right?
This is one of those times. HP, driven to paranoid mania by a perfectly ordinary story revealing that the company’s top execs had sneaked off to a posh resort to put together a strategy outline for the next 18 months. From a reporting perspective it was a fine story; from a business perspective, the strategy itself is a yawner.
But HP chair Patricia Dunn got so ticked off she launched an investigation, against the advice of HP’s corporate governance guru, that eventually let to an HP contractor hacking into the private phone records of both board members and at least one reporter involved in the story.
It seems fairly obvious that vendors use security alerts to promote themselves and devalue their competitors, as addressed in this CRN article. And I imagine many channel folks can relate to the challenges that result, i.e. defending vendor products to their customers, separating the security alert wheat from the chaff and relating that info to their customers. But how you handle this challenge? I’d like your input. How do you manage security alerts? What is your process for analyzing them and communicating with your customers? Post your comments here or email me directy. Perhaps we can come up with some best practices.
Technology is not a regulatory compliance cure-all, but it does play an important role in compliance efforts. Technology enables the automation of processes that can otherwise cost companies time and money, as reported by SearchSMB.com:
In fact, according to a new survey of 132 finance and technology executives by compliance software vendor ControlPath Inc., 74% said their companies use mostly manual processes, such as spreadsheets and Microsoft Word documents, to comply with government regulations. Even more grim: 70% admitted they had multiple projects in place for each regulation, even though it’s redundant. Only 25% say they’re automated.
Companies are wasting valuable resources and, what’s worse, their efforts may not pass auditors’ scrutiny the next time around. As auditors become more seasoned with SOX, HIPAA, etc., their expectations for compliance will evolve. They’ll expect to see more reliable controls, and better integration between business and technical controls. Sooner or later, an Excel doc isn’t going to make the grade.
When I hear technology media and PR folks discuss the Avian flu and disaster recovery, I chalk it up to FUD (fear, uncertainty and doubt) tactics. However, the findings of a survey conducted by Forsythe Solutions Group points to a larger issue. Of the more than 75 senior IT and business continuity pros at Fortune 1,000 and other major US companies surveyed, only 35% are prepared to deploy more than 10% of their workforce remotely. Obviously, this would be a problem in the case of a national health crisis. But a severe natural disaster could also make telecommuting a necessity. And while we as a nation (fortunately) have not recently witnessed a pandemic event, we have seen what a terrorist attack and natural disasters can do to our businesses. So chalk the Avian flu up to one — of many — reasons companies still need to implement a disaster recovery plan.
Intel will release another 10,500 employees into the wild as it attempts to reinvent itself. But the bloodletting in itself isn’t going to change the fundamental problems Intel faces: an inventory glut of processors that haven’t moved, stiff competition from AMD, and its new sidelines (like the poorly-branded Viiv consumer chipset line) have yet to really do anything for Intel’s bottom line.
And it’s not really clear what the impact of these cuts on the channel will be. About 5,000 of the people affected by the announcement are already gone, and it’s not clear where the other 5,500 are coming from. Its sale of its communications processors to Marvell doesn’t really directly affect resellers, and an earlier layoff of 1,000 managers in an effort to address “slow and inefficient decision-making” (announced in July) is still working itself out.
According to a Yankee Group report, the range of sales channels into the SMB is wide for wireless voice. Factors such as the size of the company and service/device ownership (employee vs. employer) determines whether an SMB purchases directly from a vendor, non-company owned stores or the indirect channel (VARs, consultants). But the bottom line is, all SMBs prefer to have their wireless voice bundled with their telephony and Internet services on one bill. In the U.S., mobile providers operate separately from traditional phone companies. This article outlines other ways the channel can support the majority of SMBs.