- Welcome Guest
- Sign In
E-mail authentication -- considered by many spam fighters as an important first step in reducing unsolicited correspondence on the Internet -- will be the focus of a summit conference to be held in New York City next Tuesday. The day-long confab at the Marriott Marquis will be moderated by Esther Dy...
The battle over the nominee to replace retiring U.S. Supreme Court Justice Sandra Day O'Connor is already roaring -- on the Internet. An array of sites -- from the left and the right -- have already sprouted online, touting the views of their sponsors, and claiming that the nomination is the most im...
Japanese electronics and handset giants Fujitsu and NTT DoCoMo proudly proclaimed joint development of a high-capacity micro fuel cell for mobile handsets this week. Is this a real breakthrough? Analysts told TechNewsWorld that the improved technology, which the companies claim theoretically improve...
Microsoft yesterday launched its Digital Image Suite 2006, a package of tools designed to help consumers organize, enhance and share digital images. Microsoft is hoping to gain greater traction in a growing digital imaging market. PMA Marketing Research predicts consumers will take 25 billion digita...
As the use of instant messaging for business and consumer purposes grows, so does the allure of writing malware targeting IM. A study released yesterday by IMlogic, which sells IM security products, reported that the number of attacks on IM systems jumped dramatically during the second quarter. The ...
Microsoft is taking a bottom-up approach to customer relationship management with the second release of its CRM software, but one analyst said the software giant won't stay in the small market forever. "It makes sense to come from the bottom," Joe Wilcox, senior analyst, Jupiter Research, told CRM B...
In the telecommunications market, convergence is evident everywhere. Carriers are trying to consolidate their data, video, and voice networks to offer a wider range of services. They are working to meld their wireline, wireless, and cable television services and to present users with one bill for a ...
Backers of a narrow-band wireless technology claim better reach than next-generation WiMax wireless. Florida-based xGTM Technology said that the latest wireless services have been limited to higher frequencies, which carry a price/performance penalty. However, their technology, xMax, requires only a...
Cisco Systems entered the middleware market when it launched its Application-Oriented Networking (AON) in late June. The technology is designed to add intelligence to the network so it can better understand business-application communications to support more effective and efficient business decision...
Beijing has officially joined international efforts to fight spam. The Chinese government yesterday adopted the London Action Plan on International Spam Enforcement Collaboration. The purpose of the Action Plan is to promote international spam enforcement cooperation and address spam-related problem...
Software engineers at Microsoft's laboratory in Cambridge, England, have developed a new, proprietary peer-to-peer (P2P) technology that is being eyed by Hollywood producers as a potential distribution channel for their content. Code-named "Avalanche," the product is said by Microsoft to be a safer ...
A recent "operation" of the Motion Picture Association of America, whose "Keystone Kops" unit is run by ex-U.S. Department of Justice deputy assistant attorney general John G. Malcolm, was a media circus. Helped by the Southern California High Tech Task Force, Malcolm and his crew raided New Century...
Looking for a Web hosting service provider? All vendors are not created equal. A little consumer education goes a long way toward ensuring you get a host that offers the right combination of products and services -- and at the right price. "There are so many Web hosting providers out there today," s...
On this day in the United States we celebrate our independence from what was reported to be a very oppressive government. Of course, since the victors get to tell the story and it all happened even before my time, I have little doubt there was another side. History may seem black and white, but I ...
Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential. A Gartner report by securit...