Search

Results 721-740 of 828 for Jack M. Germain.
CASE STUDY

Rackspace: A Study in Fanatical Customer Support

Founded in 1998 in San Antonio, Rackspace started as a managed hosting company for small businesses. Today, it includes Fortune 500 firms in its customer Rolodex, as well. However, just as when it first opened its doors, Rackspace offers no add-on services such as hardware sales or phone company ser...

Vista and the Future of OS Security, Part 2

The pending January release of Windows Vista raises questions about the security benefits of using one operating system over another. Microsoft claims that Vista's new architecture hardens it against vulnerabilities from viruses, spyware and adware attacks. However, users should be wary of putting t...

Solid-State PCs: Computing’s Next Horizon

Coming to computer stores in the not-too-distant future will be a new type of PC. It will not have a hard drive, and the operating system will be burned onto a chip, making malware manipulations and viruses problems of the past. This trend toward solid-state PCs is being driven, in part, by security...

Vista and the Future of OS Security, Part 1

The planned release of Vista at the end of January has provoked a great deal of speculation about its expected impact on hackers. Microsoft claims that Vista will offer completely new, more secure core components. Until now, users of other operating systems -- such as Unix, Linux and Mac OS -- have ...

PRODUCT REVIEW

Nine Great GPS Gadgets for Holiday Giving

Whether for business or family fun, everybody takes road trips. When traveling to unfamiliar turf, nothing can make the trip more enjoyable than not getting lost. Traditional Global Positioning Software has come a long way. A modern GPS device is something no traveler should leave home -- or office ...

PRODUCT REVIEW

Best High-Tech Stocking Stuffers of 2006

Holiday gift buying has never been more exciting. Portability has gone wild this year, and a stunning array of innovative audio and video devices have appeared that let us carry our music, movies and television programs anywhere. After reviewing dozens of the hottest products, we settled on seven of...

‘Tis the Season for Portable Multimedia Laptops

Gone are the days when laptop computers were well-traveled -- but temporary -- replacements for a more powerful desktop computer. Currently, buyers are hard-pressed to narrow their purchasing options to just a few choices. Powerful alternatives abound, making this time of year one of the best for up...

PRODUCT REVIEW

Nokia E62 Smartphone: Ideal PDA-Plus-Cell Replacement

Tired of lugging around both an out-of-date cell phone and a wireless-impaired PDA? Haven't found a smartphone that is classy enough to do both jobs? Check out the Nokia E62, which is available exclusively in the U.S. from Cingular Wireless. The Nokia E62's e-mail, Web-surfing and document-reading f...

Check Point Releases Mobile Security Software

Check Point has announced the availability of SecureClient Mobile, software that provides VPN security for Windows-based handheld devices. SecureClient Mobile offers uninterrupted connectivity and security between cellular and WiFi networks, even when the mobile link is temporarily lost by roaming b...

New Spy Sweeper Includes Sophos AntiVirus Component

Webroot Software has announced the availability of Spy Sweeper with AntiVirus, a new product developed in partnership with software vendor Sophos. Webroot produces anti-spyware products for consumers, enterprises and small-to-medium businesses. "We are taking Spy Sweeper to the next level by offerin...

Lenovo Equips ThinkPad Notebooks With Disk Encryption

Lenovo announced this week that it is arming its ThinkPad notebooks with the ability to fully encrypt the hard drive to bolster security and reduce the risk of data theft. Lenovo's latest technology move links fingerprint identity to the active directory. The fingerprint swipe recognizes 30 data poi...

McAfee Launches New Security Strategy as Microsoft Loosens Grip

Several computer security companies are bolstering their efforts to remain viable players with enterprise computer users and consumers alike, as Microsoft loosens control over security access in its next-generation operating system, Vista. Computer security firm McAfee announced on Monday a security...

The False Promise of Browser Security

Internet users are under attack -- and what's more, there's no bulletproof defense against hackers on the horizon. Despite hype to the contrary from marketing departments at Microsoft, Apple and Mozilla, Web browsers themselves -- not just the operating systems that run them -- are to blame for many...

The Skinny on High-Def Formats

Autumn is here. That means the start of the holiday shopping season, the traditional time for electronics makers to introduce their new product lines. This buying season, consumers interested in one of the new high-definition DVD players being introduced over the next two months risk buying a player...

PGP Ships New Encryption Tools

Enterprise data security firm PGP on Wednesday began shipping its new NetShare product, as well as major upgrades to its encryption and e-mail security line of policy enforcement and key data management software. PGP NetShare manages and shares encrypted network-based files. It allows enterprises to...

INDUSTRY REPORT

Online Privacy Regulations Forcing Better Handling of Data

New electronic privacy laws are forcing businesses to rethink how they handle their digital data. The retail industry is now regulated by new privacy laws aimed at reducing the growth of identity theft and consumer fraud. Congress passed The Fair and Accurate Credit Transactions Act, known as FACTA,...

INDUSTRY REPORT

Threat From Mobile Device Viruses a Sleeping Giant

Communication security experts do not all agree that cell phone and mobile device viruses pose imminent threats to U.S. consumers. Whether virus attacks become a problem in six months or five years might depend on how cell phone carriers react now to the threat potential. A Gartner report by securit...

INDUSTRY REPORT

Adoption of Alternate E-Mail Security Technologies Pushed

The adoption earlier this month of a new e-mail security technology by e-commerce merchant Amazon.com, Internet service provider RoadRunner and Internet security firm IronPort Systems signals what industry watchers say might be the start of a trend that will harden e-mail from phishing and spamming ...

INDUSTRY REPORT

Combating ID Theft on the Internet

Identity theft from phishing and pharming attacks is one of the biggest problems computer users face. It can take ID theft victims four or five years to repair the damage, according to financial consultants. "The most prevalent ID theft threat is the phishing attack, and it is getting worse. Attacks...

INDUSTRY REPORT

E-Learning Capturing Market Attention

Widespread use of computer networks and the adoption of voice over Internet protocol (VoIP) phone service are fueling the rapid growth of electronic learning beyond the classroom. The e-learning technology is improving the way for students to earn degrees and enhancing the way employers in-service t...

Technewsworld Channels