- Welcome Guest
- Sign In
Wireless carriers are finding online gaming via use of cell phones to be the latest cash cow to boost revenues. "Carriers have been surprised that wireless gaming is even more lucrative than ringtones," Ken Hyers, a senior analyst with market research firm In-Stat/MDR, told TechNewsWorld. Online gam...
For years there existed a fuzzy distinction between good and bad computer hackers. Black Hat hackers were known to crack into computer systems for the challenge and the bragging rights. These miscreants took great pleasure from wreaking havoc once they gained entry. White Hat hackers, on the other s...
As a guest of AMD, I went to Indianapolis to watch the top Ferrari team once again whomp the other nine teams in what remains one of the most expensive sports in the world. This racing team has been winning for so long and is so dominant in this sport that I often wonder why anyone watches these rac...
Biometric identification is no longer something found only in science fiction. The technology, such as fingerprint identification and face recognition, is starting to be used on a regular basis on everything from personal computers to airport security systems. Clain Anderson, a program director for ...
On April 20, a NASA rocket will lift off from Vandenburg Air Force Base carrying one of the most remarkable physics experiments ever attempted. Gravity Probe B will try to answer questions raised by Einstein's General Theory of Relativity, proposed in the early years of the 20th century. Whether Gra...
The past year has had no shortage of costly and complicating computer viruses and worms -- SoBig, Swen, Klez and Yaha, among others -- but what might be more troubling is the intersection of these attacks with the world of spam, which not only is pouring on in quantity, but also is carrying more des...