- Welcome Guest
- Sign In
The legal battle over alleged unauthorized incorporation of Unix source code into Linux is leading to scrutiny of the GNU General Public License that covers the use and distribution of open-source software. In its $3 billion lawsuit against IBM, SCO has claimed commercial users of Linux are benefiti...
Los Alamos National Laboratory announced plans with system builder Linux Networx to build a Linux cluster supercomputer, using AMD Opteron processors, that will rank among the top 10 of the world's fastest computers and will facilitate nuclear weapons research. Linux Networx -- which also scored a s...
A Verizon customer in the United States has decided to singlehandedly fight the recording industry's crusade to pry from Internet service providers the names of Web surfers who share music and video files online. The customer, whose identity has not been revealed, appears to be the first consumer to...
SCO has broadened its licensing attack against IBM by terminating a Sequent license on the same grounds it used as the basis for its earlier claims against IBM. SCO maintains that its Unix source code was used in Linux and therefore violates SCO's rights. SCO, suing IBM for billions in an intellectu...
From the 1970s to the late 1990s, the computer industry's main source of revenue came from developing business and consumer markets through channels like the personal computer, client-server networking technologies and, eventually, commercialization of the Internet. But with consumer and business te...
Security software developer Zone Labs announced IMsecure Pro, a security package that the company is calling the first comprehensive instant messaging security system for the most popular messaging services, such as AOL Instant Messenger, MSN Messenger and Yahoo Messenger. IMsecure Pro is designed t...
Interoperability of different Web services specifications came closer to fruition with this week's release of the Basic Profile 1.0 by the Web Services Interoperability (WS-I) organization. Covering commonly used Web services specifications, the Basic Profile provides guidelines for how core Web ser...
As some antivirus vendors raised their alert rating on a Windows worm that has infected thousands of home and corporate computers, the spreading code continued to take over machines that might be used in an attack on Microsoft. The worm -- referred to as MS Blast, Blaster and LovSan -- does not requ...
The SoBig.E worm, released two months ago on the Internet, continues to spread among unprotected computers. Some Internet security analysts fear that this latest variant of the SoBig family -- much like future variants of the new Microsoft Blaster worm that began to proliferate early this week -- wi...
A widely anticipated threat materialized this week as a worm that exploits a Microsoft Windows flaw began infecting some of the millions of vulnerable machines around the world. Experts said the relatively simple "Blaster" worm -- also referred to as "LoveSan" -- was spreading at a steady pace Monda...
It's official: Web services technology has gone mainstream. The technology -- which consists mainly of software designed to let business systems communicate with each other across the Internet without human intervention -- is already making a huge impact on how companies share information and conduc...
Privacy advocates and foes of the Recording Industry Association of America's campaign to subpoena the names of file-sharing computer users from universities and service providers have won a small battle in the war over online music trading. A U.S. District Court has invalidated the RIAA's subpoenas...
In an effort to provide businesspeople with an affordable, all-in-one mobile device, T-Mobile USA and Research In Motion have introduced the triband BlackBerry 7230 wireless handheld. For many business travelers, the ability to use the same device for wireless voice and e-mail connectivity while tra...
Consumer information held by Acxiom, one of the largest collectors and processors of such data, was reportedly accessed and downloaded recently by an intruder who broke into the company's massive database. Law enforcement officials, who notified Acxiom of the breach, have arrested a suspect in Ohio....
Most of us remember the scene in the 1977 movie "Star Wars" in which the robot R2-D2 projects a three-dimensional image of Princess Leia, who begs Obi-Wan Kenobi for help: "This is our most desperate hour. Help me, Obi-Wan Kenobi. You're my only hope." Seeing that film years ago planted the desire i...