Industry


Ads by TechWords

See your link here


Featured Blogs

Seth Weintraub's picture

Microsoft kills the Sidekick. The first smart phone is dead

T-Mobile has halted the sale of new Sidekicks. All models are now listed as "temporarily out of stock" on the company's site. Additionally, a warning has been added to the post on T-Mobile's forum which reads: "Sidekick customers, during this service disruption, please DO NOT remove your battery, reset your Sidekick, or allow it to lose power."



Is the the original Smartphone now dead?

...Read more

Michael Horowitz's picture
Michael Horowitz

Defensive Computing

Who's connected to your WiFI network?

How do you know if bad guys have piggy-backed onto your wireless network?

...Read more

Seth H. Weintraub's picture

FCC turns its attention to Google Voice

Remember when AT&T petitioned the FCC to investigate Google Voice? Well, now it is official, the FCC is investigating Google Voice...for the reasons laid out by AT&T.

...Read more

Valerie Potter's picture
Valerie Potter

Techalicious

Digital Think In harnesses high-tech brainpower

Allen Ginsberg may have seen the best minds of his generation destroyed by madness, but today I saw 60 of the best minds of *my* generation doing something more constructive: Putting their heads together to figure out the digital future of National Public Radio (NPR).

...Read more

IBM faces mainframe antitrust investigation

In today's podcast: IBM faces mainframe antitrust investigation; Clickfraud scheme steals from Google; and UFO hacker appeal rejected.

...Read more

IT Blogwatch's picture
IT Blogwatch

A Daily Digest of IT Blogs from Richi Jennings

Yahoo DENIES giving Iran names of 200,000 protesters

A ZDNet blogger claims that Yahoo! has been passing personal information about Iranian protesters to Iran's government. In the last few minutes, Yahoo! has denied the claim. In IT Blogwatch, bloggers wonder if it could possibly be true.
(YHOO)

...Read more

Sharky's picture
Sharky

Shark Tank

Probably because that was cheaper than another root-cause analysis

This company is moving its payroll system from one mainframe to another. But the first week that the new system runs in parallel with the old one, the total payroll is off -- by eight cents.

...Read more

Douglas Schweitzer's picture
Douglas Schweitzer

The Security Sector

Thanks for protecting my data!

Recently my wife used a credit card (which she hadn’t used for many months prior) to make a small (less than $20) purchase via her cell phone - not at a retail store or via the internet. Just a few days later she received a telephone call at home from the credit card issuer seeking clarification about what they considered unusual activity. When she called them back, using what she knew to be a veritable phone number for the company, they told her that they’d flagged the card because they’d detected an unusual charge attempt.

...Read more

Steven J. Vaughan-Nichols's picture

Who really has the most Linux users?

First, Red Hat's claimed the lion's share of the Linux market, then Novell said Red Hat's not that much in the lead, so where does the truth lie?

...Read more

Barbara Krasnoff's picture
Barbara Krasnoff

The Interesting Bits ... and Bytes

Microsoft drops Works -- finally

Okay, count how many times you've gotten a complaint from a less-than-knowledgeable user whose document couldn't be read on a friend's computer. "But they're both Word files!," the poor newbie cries. Uh, no. Almost invariably, one of them was created with Microsoft Works.

...Read more

Preston Gralla's picture
Preston Gralla

Seeing Through Windows

Ballmer: Microsoft can't make money from its free products and services

Microsoft CEO Steve Ballmer apparently disagrees with one of Microsoft's key business strategies --- to make money from free services and software such as Bing, Microsoft Live, and the upcoming Web-based version of Office. At his recent announcement of new mobile software, he said that "Free is not a business model...You'll have to ask our competitors if they'll make money on free things."

...Read more

Robert L. Mitchell's picture

Citrix: Building strong virtual desktops five ways

XenDesktop 4 brings the capability to dynamically assign the optimal virtualization approach to each client based on that user's role, location and the type of device they ride in on.

...Read more

Enterprise Innovation's picture
Enterprise Innovation

Encouraging innovation within the enterprise

Virtualization: Do I need it?

It can be difficult to quickly highlight the key benefits of virtualzation to a management team if you don't fully understand them yourself. Outlined below are a few key benefits of virtualization that every tech savvy individual should know.

...Read more

Amir Lev's picture
Amir Lev

Security Levity

The return of image spam

Image spam exampleAnother theme I want to talk about here on Security Levity is spammer tactics. I'm sure you remember the huge growth in image spam in 2006. At the time, it was typically used in stock kiting (or pump-and-dump scams). As we noted in our recent threat trends report, we're seeing it again. Yes, like Arnie's Terminator or the typical horror movie monster, it's back.

...Read more

read more | 3 comments

David Intersimone's picture
David Intersimone

Once More into the Code

Building touch, multitouch and gesture applications

Touch applications have been around for decades.  You see many of these early single touch applications in supermarkets, bank ATMs, restaurants and airport check-in kiosks.  With the advent of the iPhone and Windows 7, multitouch applications are entering the mainstream of hand-held and desktop computing. 

...Read more