Archive

Facing competition from the more widely available and less expensive DSL broadband Internet connections, Comcast has announced a speed increase in its residential cable broadband service. The cable giant said the speed bump -- which increases Comcast's high-speed Internet service from 3 megabits-per...

A group that defends civil liberties on the Internet has filed a Freedom of Information Act (FOIA) request with the U.S. Department of Justice (DOJ) to determine if the government is secretly gathering information on the surfing habits of citizens. In a copy of the FOIA obtained by TechNewsWorld, th...

Fingerprinting is an authentication technique that has helped law enforcement officials identify potential criminals for decades, but recently it has started to gain wider usage. The technique is emerging as the most popular form of biometrics, and much of the budding interest is coming from governm...

Microsoft may not be delivering its next-generation version of Windows desktop and server software known as "Longhorn" as early as expected or promised, but the company has just released the Avalon graphical interface, formerly a key component of Longhorn, for developers. Longhorn is not expected un...

It was rather hard to find true convergence products at CES. Most vendors are still too enamored with technology and not excited enough about building a truly consumer-oriented, appliance-like offering. I wasn't particularly excited about Apple's announcements either, but I'll leave that to another ...

TECHNOLOGY REVIEW

Enterprise Fertile Area for Voice Biometrics

Biometrics technology is nothing new. Biometrics security devices have been available in one form or another for several decades with little fanfare. However, the prospects for developing biometrics as a reliable security device for consumer computers were viewed by many industry watchers as a nice ...

The saying "Don't mess with Texas" took on new meaning this week as the Lone Star State's attorney general sued a college student and his alleged accomplice, accusing them of being among the world's most prolific senders of unsolicited e-mail. The lawsuit is an application of the federal Controllin...

OPINION

Winds of Change Could Help Fix Telecom

Governor Arnold Schwarzenegger's two appointees to the California Public Utilities Commission (CPUC) will soon be sworn in. Many hope these winds of change will lift California's stagnant telecom policy out of its slump, making 2005 a pivotal year for communications jobs and technology. One of the ...

After eight years at the helm, TiVo co-founder Mike Ramsey has decided to relinquish the CEO's chair when a successor is named. Ramsey will continue in his role as chairman. TiVo's struggles to gain market share in the digital video recorder (DVR) market that it pioneered are well documented. Last w...

Google responded yesterday to a bug that would allow users of the company's Gmail beta software to e-mail themselves a message which would then drag other information from other e-mails transmitted with the service. While a Unix community group known as HBX Networks detailed the quirk and provided e...

In a forward-thinking move to gain ground in the browser battle, Opera has said it would offer free software licenses for the product to universities. That means students can use its fee-based browser at no cost to schools. Pointing the finger squarely at its competitors, Opera yesterday said the of...

A new phone from Samsung Electronics has the ability to recognize and respond to the motion of its user, opening the door to a host of new mobile phone features. The SCH-S310, to be released in Korea in March, allows callers to perform such functions as speed-dial by gesture, such as "writing" a num...

Drawing on the expanded partnership they announced last year, Microsoft and SAP have created the Portal Development Kit (PDK) for Microsoft's .Net platform on SAP's NetWeaver, promising the benefits of integration and interoperability. The two software heavies said that with the development tools fo...

You spent the time and money to balance productivity and security. You installed antivirus software at the firewall, at the e-mail gateway, and on all your endpoint devices -- workstations, PCs and laptops. And your new headquarters' wireless LAN is protected with encryption keys, providing a secure...

As security experts warn that search engines can be used by attackers to search out vulnerable systems, new software shows that search technology can also be used to promote security: McAfee's SiteDigger 2.0 uses Google to learn where the computer systems of organizations are vulnerable to exposure...


What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels