Search

Results 641-660 of 828 for Jack M. Germain.
PRODUCT REVIEW

Wireless Headphone System Lets Lots of Listeners Hear the Tune

The i2i Stream digital music broadcaster is the latest wireless music delivery innovation from Aerielle. It enables users to stream audio wirelessly from any device, including iPods, MP3 players, computers and home entertainment systems. The concept of wireless voice and music transmission over shor...

SUCCESS STORY

Data Brawn Meets Interface Brains

The larger the business or government agency is, the bigger the volume of data it deals with. That translates into massive efforts to manage that data to meet ever-increasing compliance regulations for adequately maintaining electronic records. Any software company that can figure out how to manage ...

Tooling Around With Ajax

Social networks are peppering the Internet with Facebook-like interactive features. Ajax is fast becoming the defacto programming tool for Web developers. But by itself, Ajax is a daunting challenge that requires demanding coding skills. Ajax toolkits offer Web developers a shortcut method to build ...

Lean, Mean Machines: Tech for the SMB, Part 2

The continuing growth of the SMB market is pushing vendors to adapt or lose sales. Vendors are tweaking their more costly enterprise-grade offerings to feature sets and price levels SMB customers can afford. The SMB segment makes up 34 percent of the entire notebook market, according to research fi...

EXCLUSIVE INTERVIEW

Top Layer Networks’ Ken Pappas: When PCI Compliance Isn’t Enough

High-profile data breaches continue to spotlight the growing risks consumers face of identity theft and credit card fraud. Four highly visible data breaches disclosed in the last 18 months are particularly worrisome because they show a systemic failure in the procedures that both the public and regu...

The Storm Worm’s Elaborate Con Game

Despite their discovery of a direct link to the funding sources behind the infamous Storm Virus, IronPort Systems researchers are doubtful law enforcement will ever nail the perpetrators. Still, improving technologies may help to block its continuing spread. In its latest Security Trends Report, rel...

EXCLUSIVE INTERVIEW

Bhaskar Rao: Conquering Space and Time With MIMO

Bhaskar Rao is known for his discoveries in the realm of space exploration. However, he's never ventured beyond the atmosphere of Mother Earth. His space-related technology expertise lies in innovative advances in the world of signal processing. His explorations resulted in the emergence of MIMO, or...

EXCLUSIVE INTERVIEW

IBM’s Steve Sams: Taking a Swipe at Data Center Energy Consumption

Steve Sams, IBM vice president for site and facilities services worldwide, is waging a war against energy-hogging data centers worldwide. He will carry his assault to the Computer Measurement Group's international conference later this year. CMG is a not-for-profit, worldwide organization of IT prof...

EXCLUSIVE INTERVIEW

Hunting Botnets With Randal Vaughn

You might call Randal Vaughn the Botnet Slayer. After all, he spends much of his time researching the intricacies of cybercrime carried out through malware marauders perpetrating their evil deeds with robotized computers around the globe. When Vaughn is not peering through sinuous Internet traffic r...

HP’s New Eco-Friendly Printer Push

HP kicked off a new effort Thursday to expand its green computing influence with the release of a series of products, tools, services and initiatives to help customers reduce their environmental impact when imaging and printing. The product releases target the differing needs of enterprise, small an...

STARTUP TO WATCH

QuestKeys: A Workaround for the Long URL Tangle

Daniel Allen sees a problem faced by Web surfers: How to share long URLs with others and quickly locate favorite Web pages or documents without wading through lists of browser bookmarks? Allen and his wife, Mary Jane, are both self-taught programmers, among other professions. Their answer to the abo...

The Art of Cyber Warfare, Part 2: Digital Defense

In Late April last year, about 1 million computers under botnet control started attacking the Estonian government's computers in a denial of service assault. The onslaught continued for three weeks. In the aftermath of this cyber warfare incident, NATO provided the Estonian government with some help...

The Art of Cyber Warfare, Part 1: The Digital Battlefield

New-age warfare is here. Governments and Internet security firms are quietly gearing up for the potential onslaught. Don't think that cyber warfare is merely fuel for novel writers. Cyber attacks are being waged in increasing numbers. Computer network attacks are often perpetrated by gangs of crimin...

VoIP: When Cheaper Could Mean Costlier

For enterprises, the primary reason for adopting Voice over Internet Protocol phone service is money. Long-distance phone calls placed over the Internet typically cost a mere fraction of those placed under the business rate plans offered by traditional telephone companies. As a result, the business ...

Hooked on Tech: How Much Is Too Much?

Having an interest in computers and the Internet is one thing, but can going overboard with it qualify you for a deviant behavior diagnosis from a clinical therapists? That may depend on how much time you sit at the keyboard and how much that impacts your job, your family and your other important in...

The Eco PC: Less Power In, Fewer Hazards Out

How green is your computer equipment? The answer could provide insight into how much electricity you aren't buying each month to run your computers and peripherals. It can also provide a clue to how much long-term harm your computing activity is having on the world around you. The question of green ...

HP Draws Up Plans for New Enterprise Printers and Programs

HP on Tuesday introduced a new line of imaging and printer services designed for the needs of the enterprise market. A major component of the company's new offerings is a business partner accreditation, certification and test program. Its latest products help enterprises manage, secure and simplify ...

Cyber-Thieves’ New Target: Business Processes

The business use of e-mail worldwide has become so critical that the ever-increasing number of spam attacks containing malware are placing corporate and customer information at the highest levels of risk yet, according to an industry-wide survey Internet security firm Webroot conducted last month. W...

Application Acceleration: The Digital Drag Race

Computer technology in the workplace is all about hardware speed and connection bandwidth. To help IT managers augment their systems in both regards, vendors have been developing tweaking strategies to boost application speed beyond design limits. This process is called "application acceleration." H...

Teach a Man to Phish and He’ll Feed on Fools for a Lifetime

Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...

Technewsworld Channels