- Welcome Guest
- Sign In
North Korea's detonation of a nuclear bomb has made Silicon Valley, Calif., leaders even more eager to offer their expertise to help spread freedom and peace. Technology can jumpstart this quest at home and abroad, but not alone. A human element has to be present as well. Technology is often viewed...
Jeff Taylor is at it again. The Monster.com founder raised US$10 million in venture capital from General Catalyst Partners and Sequoia Capital to launch Eons, a 50-plus-targeted media company that he hopes will inspire a generation of Baby Boomers and seniors to live the biggest life possible. Taylo...
Last week's happenings foreshadowed potential changes in the wind. With the stock option backdating scandal widening, it appears that Apple CEO Steve Jobs may have been caught in the net. Meanwhile, with the realization that gaming has been driving a lot of the PC industry, and some powerful recent ...
It's a sad fact of life for today's information-driven organizations that the nature of security threats is continuously shifting and evolving. Intrusion mechanisms such as worms, Trojans and rootkit exploits continually evolve into more-developed forms, and wax and wane in terms of number and frequ...
In the recent movie "Thank You for Smoking," a tobacco lobbyist comes under fire for working to protect people's right to smoke. A similar movie could be made about gambling and the villain would be Representative Bob Goodlatte. The Virginia Republican has been fighting to enact legislation on Inter...
Internet users are under attack -- and what's more, there's no bulletproof defense against hackers on the horizon. Despite hype to the contrary from marketing departments at Microsoft, Apple and Mozilla, Web browsers themselves -- not just the operating systems that run them -- are to blame for many...
When consumers buy a top-rated software product, are they really getting what they pay for? That's what Sunbelt Software's Chief Scientist Joe Wells is addressing in the wake of anti-spyware and antivirus testing methodologies that appeared in Consumer Reports, the magazine published by the non-prof...
For years, Microsoft has come under heavy fire for not making its systems secure enough. Now, with the upcoming release of its new operating system, Windows Vista, the company is being unfairly attacked by self-interested competitors for adding more security to protect consumers. Back in 2002, when...
I visited two of the greatest cities in the United States last week. First, I was in San Francisco where Intel made a credible attempt to show that it intends to stay the market leader despite anything rival AMD has done. Then I went to New York to talk to folks about Hewlett-Packard's congressiona...
This week, Microsoft co-founder Paul Allen announced that his mouse brain-mapping project has finally been completed. This major undertaking arrives in tandem with other advances in medical technologies that will soon force political leaders to face difficult policy questions. Mapping a mouse's bra...
As technology and business align closer to an open, Internet-driven world, the current security mechanisms that protect business information are not matching the increasing demands for protection of business transactions and data. A new generation of criminals is exploiting the very connectivity th...
As we move into fall and approach the Intel Developer Forum this week, things show no sign of slowing down. Last week AMD fired an early volley at Intel by broadening an initiative designed to unite the entire slate of remaining non-Intel chip companies, making me wonder, had this happened earlier...
A decade ago, Microsoft thought it could ignore bureaucratic rumblings with little or no fallout. That attitude led to the historic Microsoft antitrust trial and the realization that bureaucrats can indeed wield bigtime impact. Google is now learning a similar lesson, albeit in a different way. In...
As technology becomes a large part of many consumers' everyday lives, the risk of overexposure to new advances grows for people of all ages. Do you know someone who is far more concerned with blogging, pinging and surfing the Internet than with eating dinner, going to the big game or even watching T...
What makes e-mail trustworthy? There are at least two factors at play here: e-mail authentication, as described in a recent article, ensures that outbound e-mail really comes from the purported sending domain. That doesn't tell you whether the sender is a highly-reputable institution or a spammer, ...