This eWEEK: July 14, 2003

Stan Gibson

If you want something done right, do it yourself. Just ask Jerry McElhatton. MasterCard’s president of global technology and operations says the global payments company’s information technology is too strategic to outsource. “Our products and services are so key to us that we have to control them,” he told me in an interview.

The reason: The use of a credit card is a personal experience. “If you try [a card] and it doesn’t work, you’re going to stick it to the back of your wallet.” That principle dictated MasterCard’s long journey, now complete, to rebuild its IT systems, the focus of this week’s special report.

McElhatton’s stand is in stark contrast to that of General Motors CIO Ralph Szygenda, eWEEK’s cover subject on June 23. Szygenda, whose company must be the world’s largest user of outsourced IT services, insists he can outsource yet retain control. Which approach is correct? There’s no simple answer. Both. GM has been wringing costs out of its IT budget for several years; MasterCard has been gaining significant ground on rival Visa.

Contrasting approaches are also the rule on the takeover battlefield. The acquisition of the week, EMC’s deal with Legato, is logical on several levels: As Senior Writer Evan Koblentz reports, Legato was for sale, and EMC needs to transform itself into a software company. Oracle’s hostile bid for PeopleSoft, meanwhile, is fraught with tension, as Senior Writers Renee Boucher Ferguson and Lisa Vaas report. Fear, uncertainty and doubt reign as PeopleSoft users wait to see if their applications have a future.

Vulnerability assessment is a product category that is not, well, vulnerable. eWEEK Labs Senior Analyst Cameron Sturdevant tested two leading products and one service in his review—and awarded his Analyst’s Choice honors to the service, Qualys’ QualysGuard Enterprise Intranet Scanner. Cameron offers sound advice: Vulnerability assessment tools must go hand in hand with a good inventory management tool. Further, vulnerability assessment is an inexact science. None of the wares tested was perfect in finding all vulnerabilities.

Finally, check out Technology Editor Peter Coffee’s Port Scans column on the well-intentioned but flawed California Security Breach Information Act.

Till next eWEEK, send your comments to stan_gibson@ziffdavis.com.

Copyright © 2004 Ziff Davis Media Inc. All Rights Reserved. Originally appearing in eWEEK.

You May Also Like

Yahoo Launches Messenger with Voice

It’s Official: Yahoo Launches Messenger with Voice Libe Goad After a three-month beta period, Yahoo officially launched its new inst…

IBM, Others Back Up Opteron

IBM, Others Back Up Opteron Jeffrey Burt Advanced Micro Devices Inc. showed up with substantial backing from computer hardware and s…

SAS Buys Verbind Assets

SAS Buys Verbind Assets Dennis Callaghan SAS Institute Inc. added to its analytical CRM offerings Monday with the acquisition of cer…

Hitachi, DataCore Sign Licensing Pact

Hitachi, DataCore Sign Licensing Pact Evan Koblentz Storage virtualization isn’t dead yet. DataCore Software Corp., one of the…