Archive

When the managers of a Danish manufacturing company arrived at Microsoft's main campus, their expectations were as unclear as the weather outside. They wanted technology to eliminate the hassles created by their disparate business systems and streamline their operations. They just didn't know how --...

With the recent bombings in Madrid and President Bush's warning that terrorists will "never be appeased because death is their banner," it might seem odd to argue for cutting the defense budget. That is, until one listens to John Arquilla, professor of defense information sciences at the Naval Postg...

Norwegian company Opera is adding IBM speech-recognition technology to its free browser software. Opera, which raised about $18 million in an initial public offering earlier this month, said it is aiming the standardized ViaVoice speech technology from IBM at enterprise customers and developers init...

Porn, spam and jobs are among the subjects found in the latest list of proposed top-level domains (TLDs) hoping to join the ranks of .com, .net, .org and others. According to the Internet Corporation for Assigned Names and Numbers (ICANN), the governing body of the Internet, 10 groups have applied f...

TECHNOLOGY SPECIAL REPORT

Global Extortion: Online Gambling and Organized Hacking

A new trend in extorting money from sports and gambling Web sites isn't going away like security experts had predicted. Online gambling Web sites began receiving e-mail threats in October of last year. The messages contained demands for money to prevent distributed denial-of-service (DDoS) attacks t...

Game giant Electronic Arts is giving the University of Southern California's Interactive Media Division a multimillion-dollar donation to advance interactive media education and produce professionals for the next generation of gaming. The money -- which is part of EA's global education and talent de...

A computer worm that targets antivirus or firewall protection is nothing new, but the most recent case of a direct attack against computer defenses unfolded with alarming speed, less than two days after vulnerabilities in Internet Security Systems' BlackICE and RealSecure software were disclosed. As...

LOOKING FORWARD

Starbucks and HP: The Future of Digital Music

Last week I flew down to the launch of the new Starbucks music service and got far more out of the event than a cup of coffee and some free music. I got a sense of why Starbucks is as successful as it is and why HP is suddenly emerging as the company to beat in the technology space. I also went away...

TECHNOLOGY SPECIAL REPORT

3G Networks Ready To Take Hold

Faster, more flexible, less expensive and more functional has been the telecommunications industry's mantra. As soon as one networking technology takes hold, vendors begin pushing another that promises to deliver more functionality, and such a scenario is now unfolding with wireless wide area networ...

Rounding out the last half of the alphabet with Bagle.Q, Bagle.R, Bagle.S and Bagle.T variants, the latest worms in a long string of malware have become more sophisticated and sneaky, leaving security experts to ponder what might come next from the evolving family of malicious code. Reports from ant...

A former Romanian software programmer who now works for Microsoft has filed a $25 million lawsuit against peer-to-peer (P2P) leader Sharman Networks, which owns and runs the Kazaa file-sharing utility that the man, Fabian Toader, claims is his work. Toader, who worked on a freelance basis for Kazaa ...

An unsolicited e-mail arrives in your in-box from Marc Racicot, chairman of the Bush-Cheney '04 campaign, asking you to donate "using our secure server," a total of $2,000, $1,000, or a smaller sum, to keep TV ads exposing John Kerry's miserly defense spending record on the air. Political spam, like...

TECHNOLOGY SPECIAL REPORT

Passwords Fail the Security Test

Passwords are the first line of defense in almost every company's security scheme. But sometimes they are the weakest link because they can be easily guessed, stolen or otherwise compromised. If a firm wants to keep its information secure, then it needs to put additional security checks in place. Pa...

SOFTWARE TOOLBOX

Free Utilities To Annihilate Spyware

Spyware has surpassed viruses as the number one threat facing your computer today. In fact, most estimates report that 90 percent of computers already have been infiltrated by spyware, which is the name given to any program that installs itself on your hard drive, collects personal information about...

Internet civil libertarians are raising red flags over parallel bills in the California state legislature that would punish file traders of copyrighted materials with up to a year in jail, $2,500 in fines or both if the users do not provide their real names and addresses with the title of the work. ...


Technewsworld Channels