Search Results

Results 61-80 of 319 for Susan B. Shor

Analyst: Kazaa Lawsuit Loss Means Little

File-sharing network Kazaa must alter its software to try to stop illegal music sharing, a federal judge in Australia ruled Monday, but one analyst said the ruling won't change peer-to-peer file-swapping at all ...

Kazaa Loses Lawsuit; One Analyst Shrugs

File-sharing network Kazaa must alter its software to try to stop illegal music sharing, a federal judge in Australia ruled yesterday, but one analyst said the ruling won't change peer-to-peer file-swapping at all ...

Intel, Philips Team on Media Center

Intel and Philips are working together to build and market home entertainment centers that will run on Intel processors, the chipmaker said at IFA, the International Consumer Electronics Fair, in Berlin ...

Arrests Offer Glimpse Into Hacker Culture

There's a wealth of information out there for hackers, or "black hats," as they are also called. The arrest last Thursday of alleged Zotob writer Farid Essebar, 18, who went by the name Diabl0, has shed some light on the thriving underground culture, but much remains a mystery ...

Rumors of an iTunes Phone Stir the Crowds

Apple has done what it does best once again. Fans and the media alike are abuzz trying to guess at what the company will reveal Sept. 7 at a "special event" in San Francisco ...

Analyst Hopes Zotob Arrests Will Curb Worm Attacks

Although law enforcement officials have arrested two men they believe wrote the Mytob and Zotob worms, one security expert said there may not be much enterprises can do to stop such infections from striking again ...

Analyst Hopes Zotob Arrests Slow Malware Activity

Although law enforcement officials have arrested two men they believe wrote the Mytob and Zotob worms, one security expert said there may not be much enterprises can do to stop such infections from striking again ...

Two Phishing Scams Target PayPal, eBay Users

Two new phishing scams, one targeting PayPal and one eBay, are making the rounds on the Internet today, the anti-malware company Sophos said ...

PalmSource Takes Another Step Toward Linux

PalmSource and MontaVista Software said today that they will work together to speed the development of next generation Linux-based mobile phones, a move that furthers PalmSource's decision to move its Palm OS onto the Linux kernel ...

International Identity Theft Ring Discovered

A spyware ring has infiltrated the IT systems of as many as 50 international banks and logged social security numbers, credit card and bank account numbers, passwords, eBay and PayPal account information and chat transcripts, according to the security firm Sunbelt Software ...

IBM Takes Data Search Technology Open Source

IBM Research will turn over its data search technology to the open-source community, the company said yesterday. The Unstructured Information Management Architecture (UIMA) searches store data not through keywords, but by analyzing the data within documents to see if they fit the concepts and facts the user is researching ...

IBM to Open Source Conceptual Search

IBM Research will turn over its data search technology to the open source community, the company said today. The Unstructured Information Management Architecture (UIMA) searches store data not through keywords, but by analyzing the data within documents to see if they fit the concepts and facts the user is researching ...

‘Microsoft Effect’ May Change Shape of CRM for SMBs

Microsoft announced in July it was stepping full force into the small- to mid-size business (SMB) market with a customer relationship management (CRM) product designed to fit into its Office software suite ...

FCC Lets SBC, Verizon Off the Hook on DSL Line Leasing

The Federal Communications Commission (FCC) decided today that telephone companies that offer high-speed Internet access do not have to share their wire lines with other DSL providers ...

Viruses for Vista Offer Glimpse Into Malware’s Future

Although F-Secure, a Finnish antivirus company, reports that it has discovered the first malicious code targeted at Microsoft's Windows Vista (formerly code-named Longhorn), the command shell the hacker cracked is not an integral part of the new operating system ...

New Cell Phones Target ‘Tweens’

It's a modern parental dilemma: Should children have cell phones? Hectic schedules make it convenient to be able to reach your 10-year-old when he's at swimming lessons and you're stuck in traffic. But if you decide to go that route, is your child responsible and mature enough to use the phone correctly and appropriately? ...

Vonage Makes Deal for WiMax VoIP

Vonage has taken a step into the WiMax world, making a deal with TowerStream, a provider of high-speed Internet access. The deal is the first of its kind between VoIP and WiMax services ...

Intel Teams With Boeing for WiFi on the Fly

Intel has joined forces with Connexion by Boeing to help ensure that travelers almost always have access to the Internet ...

Open Source Group Proposes Software Ratings Plan

Because open-source software is written by individual developers or groups of developers on their own time and with their own resources, the quality of the product is an unknown ...

Intel, Boeing Promote In-Flight WiFi

Intel has joined forces with Connexion by Boeing to help ensure that travelers almost always have access to the Internet ...

E-Commerce Times Channels