- Welcome Guest
- Sign In
As we watch the disaster relief effort play out in the aftermath of Hurricane Katrina we seem to be falling into the same old pattern of focusing on finding the right scapegoat rather than trying to make sure we can deal with similar future problems. Even after 9-11, the tsunami, and a variety of o...
Internet Protocol Television (IPTV) is set to grow tenfold by 2010, but according to industry reports the leader won't be the United States. Instead, countries such as China, France, and Italy are forecast to lead. It's possible, however, that recent changes in Texas and at the Federal Communicatio...
Except for those of us who build our own desktop computers, laptops have become the product that increasingly defines our personalities and which one we choose says more and more about who we are. Until recently our choices were defined by vendors: Apple if you favored high design, IBM if you liked...
It has kept domain disputes involving huge companies and small profiteers known as "cybersquatters," as well as other Internet address disputes, out of court, but is the domain arbitration that is mandatory for Internet Corporation for Assigned Names and Numbers (ICANN) domain registrants fair? Lega...
The good and the bad associated with Voice over IP (VoIP) is becoming clearer. Increasingly, consumers and enterprises are turning to VoIP because it can save them money and enable them to take advantage of features, such as unified messaging. As this networking option gains popularity, however, it...
Enterprises are constantly looking for ways to reduce their IT expenses, and hardware purchases represent a significant portion of those costs. "Companies want to avoid buying faster systems year after year and grid computing has that potential," said John F. Andrews, chief operating officer at mar...
With the Zotob virus allegedly being spread by improperly patched notebook computers and bringing down an impressive number of news sites last week, the future of the notebook computer, at least as we now know it, may be changing dramatically. As far as direction, strangely enough, it is once again ...
San Francisco Mayor Gavin Newsom asked for public feedback this week on a plan to create a citywide, free wireless broadband network. The response should be a no-brainer, especially in a city dubbed the number-one wireless market in the United States. Getting high-speed access in San Francisco is no...
The once thick walls that have traditionally been separating IT departments from its business leaders at companies both large and small are beginning to thin and crack. In fact, all signs indicate that these walls will soon crumble completely to create a new environment in which business leaders an...
Music being burned onto CDs is becoming a bigger threat than P2P file-sharing to both the music industry and record stores. The news comes from Recording Industry Association of America chief Mitch Bainwol, speaking for his bosses and the RIAA's owners, the members of the Big Four record label carte...
Y2K may be a distant memory, but there are plenty of other threats against corporate IT systems. In fact, today's list of disaster threats includes more than just hurricanes and blackouts -- chemical attacks and terrorist bombings have become a stark reality. Although fires, floods and earthquakes a...
This week, let's look ahead at changes coming in hardware over the next few years and the players driving those changes. It is certainly time for a change. In 1984 we had two PCs in the business space, Apple enjoyed 40 percent market share and had two innovative designs (the Apple II and the Mac) -...
Last week, the Federal Communications Commission (FCC) made an important ruling in favor of competition in broadband services. This change points the country towards greater broadband deployment, investment, and innovation. The Supreme Court's Brand X decision in late June made it clear that cable ...
What do you do if you need to prove your software is virtually hack-proof? Well, you could always hire a renowned former hacker to attempt to foil the system and mount a successful phishing attack. That's just what 41st Parameter did. The company's patented anti-fraud technology, dubbed TimeDiff Lin...
Corporations' reliance on e-mail systems to circulate information has grown exponentially, but their ability to sort, retain, and locate e-mail messages has not evolved as quickly. "In many organizations, few procedures are in place that outline how to manage e-mail correspondences, and often compan...