Archive

In its monthly scheduled security update, Microsoft released four sets of patches, totaling 33 updates, to counter several vulnerabilities in the company's widely used Windows operating system and other software products. Microsoft said three of the four patch sets are "critical vulnerabilities," wi...

A filing Tuesday with the U.S. Securities and Exchange Commission, the regulatory body that monitors publicly traded companies, indicates that Dell last year generated most of its new jobs overseas, in the fastest-growing markets there, including China. Dell's disclosure confirms the pattern in glob...

It may seem simple, yet it is often overlooked. When it comes to choosing the right Internet hosting provider, the majority of business owners know very little about making the best decisions. What makes a good Internet host for a business Web site? What makes a bad one? How can the wrong host harm ...

Earlier today, at a developer's forum in Taipei, Taiwan, chipmaker Intel disclosed that it has developed two new, low-priced Itanium processors targeted toward the server market. Servers employing the new processors will be about 28 percent lower in price and up to 25 percent faster than earlier dua...

Iomega, one of the largest storage peripherals providers in the United States, began shipping a new drive today designed to go head-to-head against tape backup systems. The new REV drive, which comes in 35-GB and 90-GB capacities, consists of a drive housing plus the new REV removable media that is ...

How far Sun Microsystems and Microsoft take their newfound cooperation remains to be seen, but analysts agree both companies are being forced to embrace one another to fight off the successful interoperability and multiplatform approach of others, such as IBM, HP, Dell and Novell. The recent announc...

Think that viruses and worms sent by e-mail are an IT security nightmare? Wait until you experience the next assault hackers are unleashing -- the browser-based attack. The second annual survey on IT security and the workforce conducted by CompTIA, the Computing Technology Industry Association -- a ...

While the Federal Communications Commission (FCC) mulls over what to do about services for making phone calls on the Internet, two legislators have decided that the U.S. Congress should get into the act. Sen. John Sununu (R-New Hampshire) and Rep. Chip Pickering (R-Mississippi) have filed bills in t...

TECHNOLOGY SPECIAL REPORT

Can Software Kill You?

Software can kill you. Don't think so? Talk to the family members of 21 deceased patients treated at the National Cancer Institute in Panama in November 2000. The cancer patients died after being overdosed by a Cobalt-60 radiotherapy machine. The technicians who entered patient and medication data i...

It may be a one-time fluke or a sign of the broader economic recovery, but domestic music sales in the first quarter of this year increased dramatically for U.S. record labels. Fueled by sales from artists like Norah Jones and Usher, both of whom accomplished the now-unusual feat of selling 1 millio...

Public comments are due today at the Federal Communications Commission regarding a policy proposal instigated by the Federal Bureau of Investigation to bolster government surveillance of the Internet. Last month, the FBI, along with the Drug Enforcement Administration and the U.S. Department of Just...

Intel CEO Craig Barrett is urging Northeast China to use information technology to transform and advance the region's competitiveness in an expanding global digital economy. In a speech before business, government and education leaders in Shenyang, Barrett said deploying and maintaining a modern IT ...

Now that it has more firmly projected 2006 as the year it will deliver the next-generation Windows operating system, known as Longhorn, Microsoft is cutting overly ambitious parts of the software to avoid delays and ensure quality. The industry, which has been promised much by Microsoft with its tal...

The topic of IT scams, both those done to IT folks and those done by IT folks, has come up several times in conversations over the last month. Since internal audit organizations are receiving massive increases in funding, staffing and provisioning, I thought it would be good to review some of the mo...

The first reported malicious code to target Apple's Mac OS X operating system, a potentially damaging Trojan Horse computer program, is serving as both a validation of the platform's security and a warning that more may be coming. Announced by Mac security vendor Intego, the Trojan horse, dubbed MP3...


Technewsworld Channels