StratVantage News Summary
Upcoming speaking engagements
The TrendSpot
Internet
News
Opinion
Publications
Enterprise Architecture
Security Information
B2B Ecommerce Resources
Marketing Information
|
|
Be on the wave or under it™
The News – 10/30/01
In
this Issue:
|
Recommended
Reading
|
|
I realize this is the only newsletter you’ll ever need,
but if you want more in-depth detail, check out:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cost
of eBusiness Has Dropped, and So Have Many Consulting Firms
It wasn’t all that
long ago that leading industry analysts like GartnerGroup were quoting million
dollar price tags for fully-developed, eCommerce-enabled Web sites. That
obviously scared many businesses away. According to BtoB magazine, however, the
price never really got that high, topping out at $608,000 last year. The real
good news is that the price has dropped significantly in the last year to
$250,000 for a large site and only $65,000 for a small site. The main reason
for the decline has been the dot-com collapse, according to the magazine.
Whereas last year many site builders couldn’t keep up with the demand, this
year the lack of dot-coms and the tight purse strings of blue chip firms has
driven many development firms to trim staff, cut costs, and even declare bankruptcy.
Also contributing to the lowered cost has been the maturation of the tools and
techniques consultants use to build sites. At the same time, the arms race of
advancements in HTML and other Web technologies has slowed over the past year.
This has allowed formerly-premium skillsets to become commoditized, and thus
cheaper to obtain.
|
Small
|
Medium
|
Large
|
May '01
|
$65,000
|
$125,000
|
$250,000
|
May
'00 *
|
$113,500
|
$119,500
|
$608,000
|
Sept.
'99
|
$77,500
|
$170,000
|
$405,000
|
Feb.
'99
|
$78,000
|
$150,000
|
$440,000
|
June
'98
|
$44,500
|
$99,750
|
$302,975
|
Oct.
'97
|
$25,000
|
$83,000
|
$275,000
|
April
'97
|
$18,750
|
$67,500
|
$330,000
|
Sept.
'96
|
$26,100
|
$102,025
|
$596,073
|
All this means it’s
a buyer’s market for Web technology. In fact, there may never have been a
better time to buy Web technology. Unfortunately, customers are staying away in
droves.
Things have
gotten even worse for Web development houses since May, when the article was published.
There have been high-profile flameouts like MARCHfirst,
and a raft of industry mergers
and acquisitions.
Even the Big 5 consulting houses have had to roll back their rates and cut
staff. Nonetheless, size has offered some protection in the professional
services market, as the little guys are suffering as the big firms start
reaching lower in order to find deals.
An innovative way
for smaller professional services firms to gain size without consolidating is
represented by Catenas, a professional
alliance of 10 small to midsize companies with combined sales of $132 million.
The members are niche leaders in areas like Web development, relationship
marketing, and data mining, and none competes directly with the others. And
they’re not all companies you’ve never heard of. The McKenna Group, marketing
guru Regis McKenna’s company, is a member. The companies plan on sharing
employees, office space, project-management software, mass procurement, banking
relationships, and a credit line. Rather than participate in the current
industry consolidation, Catenas vows to never roll up its member companies, and
owns an equity stake from 10 percent to 49 percent in the member companies. In
turn, each of the member companies owns a 5 percent stake in Catenas. Using
business alliances as an alternative to mergers and acquisitions is becoming
more common phenomenon, often as an outgrowth of grassroots and industry
associations.
Businesses in
the market for Web solutions should be able to pick and choose from a selection
of ardent suitors. These competing professional services firms are using more
mature and less expensive toolsets that are more likely to produce the desired
result. All that’s the good news. The bad news is, if spending on eBusiness
development doesn’t pick up soon, attrition will assure buyers of much less
choice in the future. As firms shed high priced, experienced talent in an
attempt to compete on price, the quality of solutions could suffer as well. The
possible bright spot is the fact that professional services firms, with their 6
to 9 month deal lead times, are a lagging indicator. Once they bottom out, we
can be confident the economy is on the rebound.
BtoB
Briefly
Noted
- Shameless Self-Promotion
Dept.: Look
for a new directory, debuting this week: Nanotechnology Resources.
Frankly, I was overwhelmed at the amount of information on the Net about
this technology and thus didn’t get the directory finished in time for the
article in the last
SNS. It will feature commercial and academic resources along with pointers
to other directories and link pages.
StratVantage
Directories
- Time to Face Face
Recognition Software: In the post-WTC world, opposition to the ubiquitous use of face
recognition systems has lessened. There was a great hue and cry after
it was used at last year’s Super Bowl and by Tampa police in certain
problem neighborhoods. GartnerGroup sums it up this way: ”Predictably,
many object to using face recognition the way Tampa has, arguing that the
technology gives too much power to the state, and that it increases the
chance for misidentifications and false arrests. Others contend that the
technology provides a relatively nonintrusive means of apprehending known
felons and potential terrorists, as opposed to more traditional police
practices such as random street searches or roadblocks.” Nonetheless,
Gartner thinks face recognition could find uses in screening school
employees, day care workers, or bus drivers, in developing child ID
programs to help find missing children, and as a general authentication
scheme for computer access and voter identification.
Video crimefighting the old fashioned way was given a boost recently when
Biscom unveiled Webeyealert, which transmits live video via the Web or
mobile devices. The inexpensive, motion-activated product is aimed at
keeping tabs on work environments, schools, airports and other venues. One
high school in New Hampshire reported that vandalism ceased once
Webeyealert was deployed. So one way or another, it’s much more likely
someone is watching these days.
For me, the key to acceptance of surveillance systems, face recognition
and other biometric systems is how the technology is used. Currently, the
Tampa police erase images they obtain if there is no match to a known
criminal. Unless this procedure is mandated in law and in software,
however, there’s nothing to stop the police’s usage from evolving into
surveillance of citizens without probable cause. Before we go to overboard
on the use of any biometric technology, we have to be sure the problem
we’re solving is worth what we give up. For example, is voter fraud
widespread enough to make the creation of a face image database of the
entire US voting population worthwhile? The type of power represented by
such a step can only be good if we trust our government to always do the
right thing. Even Congress doesn’t do that. Witness the four-year time
limit it placed on the new law enforcement powers granted in the Mom &
Apple Pie, er, Anti-Terrorism bill. Gartner recommends government move
slowly on this issue, to ensure privacy concerns are adequately addressed.
GartnerGroup
- Denial of Service
Attacks Getting Scary: Carnegie Mellon's CERT Coordination Center warned recently that
Windows users and Internet routing equipment are the targets of miscreants
who launch denial of service (DoS) attacks online. A denial of service
attack enlists dozens or hundreds of machines (colorfully termed zombies)
to bombard a Web site with bogus requests, effectively denying service to
legitimate users. According to CERT, crackers have begun targeting
sections of the Internet that are likely to contain Windows machines. The
shift from Unix machines to Windows computers as the preferred DoS hosts
began late last year. Crackers are also using routers, which control the
flow of information on the Internet, in attacks, preying on machines with
weak passwords. Attackers are increasingly using Internet Relay Chat
(IRC), a type of Instant Messaging (IM) system, to direct DoS attacks.
Most alarming, however, was the contention by many speakers at a recent
security conference that things really aren’t that much better,
network-wise, than they were in February 2000, when a fifteen-year-old
Canadian boy used distributed denial of service tools against sites like
eBay, CNN.com and Yahoo!, knocking them offline.
The Register
- The Taliban Virus: With all that’s going on in the world, sometimes you
just need a good laugh. So here’s the Taliban Virus, presently circulating
in the wild:
DEAR RECEIVER,
You have just received a Taliban virus. Since we are not so technologically
advanced in Afghanistan, this is a MANUAL virus. Please delete all the files on
your hard disk yourself and send this mail to everyone you know.
Thank you very much for helping me.
Abdulla
Talibanian hacker
- New Red Hat Linux Release Compromised? Just to try to convince those of
you who are sure I’m an anti-Microsoft bigot that I’m not, and in the
spirit of a previous
SNS, I present this item about the possibility of a breach of security in
version 7.2 of Red Hat Linux, released October23rd. A security expert
claimed the latest online update of the operating system, code named
"Enigma," may have been tampered with by attackers because two
distribution files available from some download sites were not digitally
signed by Red Hat. I’m immediately suspicious of this claim, however,
because it smacks of a publicity stunt. The source of the information is a
security
expert who just happens to plug his book in the news item. “Either Red
Hat did not sign these packages, or someone subverted the distribution
process before the files got to various sites,” said the expert, who will
remain nameless here to prevent any more free publicity. Without digital
signatures, “it becomes trivial for an attacker to replace packages on a
distribution site with no one being able to easily verify that they have
been subverted.” Red Hat confirmed that the
two files lacked signatures, but asserted that there was no security
compromise. The company didn’t sign the files because they did not deem it
necessary, according to a spokesperson. One of the unsigned files was
merely a listing of files in the distribution and the other contained the
version number of the release. Red Hat said security-conscious users
should obtain the distribution via CD ROM.
Newsbytes
- Microsoft
Blames the Messengers:
Scott Culp, manager for Microsoft's security response center, published an
essay on the company's site attacking the common practice of releasing
sample code that demonstrates a security hole in the company’s software.
Calling it “information anarchy,” Culp obviously seeks to draw a line
between responsible disclosure and arming people with the tools and
software needed to attack computers. You know what? I agree with him, to a
point. Many of the people who find and publicize bugs in Microsoft
software make no attempt to get the software giant to fix the problems
before releasing so-called exploit code. They do this for their own
reasons, which may include notoriety and hatred of the software monopoly.
I also agree with Culp when he argues that security bugs will never go
away. But what I don’t agree with is the rather transparent way that
Microsoft is trying to deflect blame from recent debacles like the Code Red
worm, which infected
more than a million Web servers running Microsoft's Internet Information
Server software, and the Nimda worm, which caused havoc by
exploiting holes in both servers and desktop computers running Microsoft
software. Microsoft needs to address the repeated vulnerabilities of their
software first, and blame the messengers later, no matter how
inappropriate their message is. C|Net
- Power from
Space: The
science fiction concept of gathering abundant solar power via orbiting
satellites and beaming it to earth may be a feasible solution to our energy
problems, according to two recent studies. Space Solar Power (SSP) has
been discussed since the ‘60s, and reviewed by both NASA and the
Department of Energy in the past. In 1995, NASA started its Fresh Look
study of the technology, and concluded that it might be a good idea after
all, if the high cost of launching to orbit can be brought down. The
National Research Council (NRC) recently took a new look at NASA's current
SSP efforts in the report: Laying the Foundation for Space Solar Power
- An Assessment of NASA's Space Solar Power Investment Strategy. The
report notes several advancements that help make SSP more feasible:
Improvements in solar cell efficiency and weight; wireless power
transmission tests in Japan and Canada; improvements in robot
manipulators, machine vision systems, hand-eye coordination, task
planning, and reasoning; and wider use of advanced composite materials and
digital control systems. The second study was done by energy and environmental
policy think tank Resources for the Future (RFF). The study looks at SSP
as a means of providing power for in-orbit activities, such as satellites
and space stations. One big advantage of such an approach is the ability
to leave out heavy power supplies when launching satellites into orbit.
Sounds like it may not be too long before Robert Heinlein’s 1942 view of a wireless-powered
future becomes reality.
Space.com
Return
to Mike’s Take
|
Copyright © 2002, StratVantage Consulting,
LLC. All rights reserved.
Please send all comments to .
|
|