- Welcome Guest
- Sign In
The disclosure of a handful of critical security holes reported in Microsoft's Internet Explorer Web browser is conjuring up an old debate about the process of reporting security vulnerabilities as well as the usual concern over hacker attacks and compromised computers. The five scripting vulnerabil...
IDC's Worldwide Quarterly Server Tracker indicated growth for nearly all classes of the network computers, with a whopping $10.8 billion in overall revenue representing 2 percent growth in the third quarter of 2003. Overall shipments of servers worldwide grew almost 20 percent, driven primarily by d...
It's official: Web services technology has gone mainstream. The technology -- which consists mainly of software designed to let business systems communicate with each other across the Internet without human intervention -- is already making a huge impact on how companies share information and conduc...
IBM hopes to hit it big with its new Business Integration Game (BIG) technology, which is a software system designed to throw third-party e-commerce and communication into the latest online role-playing and multiplayer video games. The BIG framework, which uses open standards such as SOAP and J2EE, ...
Intel has revealed plans to extend the number of transistors the company can put on chips with existing equipment. The next-generation technique includes a 65-nanometer process that the company said will help develop more capable processors and larger, more cost-effective 300-nanometer wafers, which...
Apple Computer lured millions of PC users into its online music store when it released a version of its popular iTunes software for Windows, but it also attracted a less savory element -- hackers. Just 10 days after the release of "WinTunes," a crafty codesman at Trinity College began distributing M...
Incessant, unsolicited e-mail brought out the worst of a Sunnyvale, California programmer who is now charged with 11 federal counts of illegal interstate communications after he graphically threatened to harm, torture and kill the alleged spammer in a series of e-mails and telephone messages. As it ...
I spent several days at Comdex last week. If you were there -- and you work as a systems builder, a parts vendor or an analyst -- Comdex was a great show. If you work as an IT executive, you were probably disappointed because the show set IT expectations that it didn't fulfill. As usual, rumors were...
Computer chip king Intel has committed to producing a 4-GHz processor by the end of next year as it adopts an aggressive push toward smaller, faster 90-nanometer chips that cost less for the company to make. The official announcement of plans to hit the 4-GHz mark in 2004 might be less significant t...
Despite an expected spike in the amount of IT services outsourcing to offshore firms, the impact likely will be mitigated by solid services-industry growth in the United States, researcher IDC said in reporting the results of a recent survey. While offshore hiring will spread across a wider range of...
Computer Associates announced this week at Comdex that it will offer a free one-year subscription to its eTrust EZ Armor antivirus and firewall desktop security suite. TechNewsWorld turned to Ian Hameroff, Security Strategist and Director of Research and Response at Computer Associates, to talk abou...
In a move described by at least one industry observer as something the Baby Bell had to do, SBC Communications has introduced Voice over Internet Protocol (VoIP) -- a technology that will let customers conduct conversations using the Internet rather than telephone systems. SBC said the "powerful new...
AMD has announced groundbreaking on a new manufacturing facility in Dresden, Germany, that will help the company keep up with what it claims is growing demand for 64-bit chips. The Sunnyvale, California-based chipmaker, which announced a significant deal to put its 64-bit Opteron processors in Sun s...
A bill to take the "spy" out of spyware got a public hearing before a Congressional subcommittee Wednesday. The legislation filed by Rep. Mary Bono (R-California) would require spyware purveyors to inform computer users of the presence, nature and function of their applications, as well as seek perm...
SCO chief executive Darl McBride's explanation and defense of his software company's legal strategy has brought on a flurry of activity in the open-source software community. Among the more significant developments, SCO indicated it is poised to bring legal action against at least one of the compani...