- Welcome Guest
- Sign In
A curious change has come over the image of computer security in the last few years. Whereas headlines once screamed the exploits of allegedly evil hackers, the story now is all about bad code -- unpatched software, poorly secured firewalls and computer passwords left in plain sight. The hackers are not the real culprits; the security holes are ...
I'm writing this article on my computer with a pen input tablet, forsaking the usual speed and ease of the keyboard to see how the other 14 percent lives. I'm referring to the 39.5 million Americans over age 5 with some kind of disability, acording to the 2000 U.S. census. When I broke a bone in my right hand recently, I was suddenly thrust into that other world. I decided to explore the state of assistive technologies and see how well I would get along...
This year has seen a lot of ink spilled over Apple's PowerBook line of computers, in particular the high-end 17-inch model. Critics drooled over the unprecedented size of the laptop's screen and the elegant and relatively lightweight case, to say nothing of the sex appeal of the polished aluminum finish ...
Every once in a while you get a taste of what the Internet would be like if it were left to a few private enterprises. One glaring example is the deplorable state of instant messaging, which, in part because of balkanization, has failed to reach the level of popularity enjoyed by plain old e-mail. Another is the paucity of high-speed DSL and cable Internet connections, which demonstrates how major service providers create islands of connectivity. It seems that private enterprises, left to their own devices, have a tough time supporting the ubiquitous and open connectivity that has been the hallmark of the government-funded Internet throughout its 30-year history...
A curious change has come over the image of computer security in the last few years. Whereas headlines once screamed the exploits of allegedly evil hackers, the story now is all about bad code -- unpatched software, poorly secured firewalls and computer passwords left in plain sight. The hackers are not the real culprits; the security holes are ...
2003 was supposed to be the year of the PC upgrade. Last fall, as analysts fretted over a PC market that had lain fallow for two years, observers counseled that the coming year might prove rosy, with an upgrade cycle driven by, among other catalysts, a new version of Microsoft Office ...
Signs of the times follow patterns. In the fat years of the 1990s, we heard a lot about supersize drinks -- and ballooning IT budgets. In the present belt-tightening environment, the FDA is forcing food makers to disclose harmful "trans-fat" content -- and the SEC is forcing onetime high-fliers to open their books to scrutiny. ...
And so we come to the end of an era. When EMC announced on July 8th that it would buy software firm Legato Systems for $1.3 billion, it was the most potent sign to date that hardware innovation and systems engineering no longer define the warp and woof of corporate computing. Software has taken over. ...
Here's an ad I'd like to see in the online personals. "Established $118 billion networker seeks respected microcomputer company for technology integration, product fusion, customer rollup. Must have own intellectual property, stable income, smart staff and a desire to conquer the enterprise networking market. Startups need not apply." ...
Here's a day in the upside-down life of a CIO: She reads a bunch of news articles about deflation on the train and gets depressed about the economy, then takes a phone call from a pollster and tells him she's not planning any new technology buys. Later, near the end of the day, she tells her staff to enter an order for a bunch of Gigabit Ethernet cards. Such is the quixotic landscape in which tech is struggling to make a comeback. Economic data show modest signs of recovery, but the outlook of many tech buyers remains sour.
Peer-to-peer technology may have pulled off the greatest disappearing act of the post-dot-com era. Once heralded as the second coming of the Internet, file-sharing giant Napster was sued out of business, and many of its descendants, such as Kazaa and Morpheus, are under fire from the Recording Industry Association of America (RIAA). ...
On Monday, Apple Computer chief potentate and executive kibitzer Steve Jobs presented Apple's latest high-end computer system lineup, driven by the IBM PowerPC 970 processor and branded by Apple as the G5. The systems surprised observers with speeds higher than what IBM promised when it debuted the PowerPC 970 a year ago. In fact, the hardware adds up to what Apple claims is the fastest desktop computer, leading Jobs to punctuate his trademark marketing pitch at the developer conference with the continual refrain, "Pretty cool, huh?"...
Fancy the situation of the computer OEM, stuck selling the same software from Microsoft for the next two years -- software that's already been around for more than a year and a half. We may be seeing a four-year cycle between Microsoft upgrades, certainly the longest I can remember. With PC sales in dollars predicted to be down by perhaps 1 percent this year, it's enough to make a computer OEM wonder: Why don't they just slap that "Bob" software on the thing and call it Win95: Reloaded? ...
It seems hard to believe that six years ago, pundits were wondering if people would send their credit-card numbers over the Internet. Some said firmer controls were needed before e-commerce could take off. Then someone else made the brilliant observation that sending your credit-card number to Amazon.com via modem is no more or less risky than leaving a carbon copy of your credit card at the local drugstore. Everyone forgot their reservations, and consumers went on to spend tens of billions of dollars online last year...
It would be a gross understatement to say the Mac faithful are eagerly awaiting a new office productivity suite from Apple. For rumor sites and Mac-focused blogs, the arrival of such software would be a touchstone, a new battle royale in which to turn up one's nose at the leading productivity suite, made by that big software company in Redmond. ...
Enterprise search capabilities have evolved much like the known universe. Scientists tell us that it was not until several trillionths of a second after the Big Bang that gravity, matter and antimatter took shape and added complexity to everything. Likewise, although the Internet burst into the mainstream several years ago, many enterprises are only just beginning to consider how world-class search capabilities could benefit their in-house infrastructure...
The United States is a wired nation, but not completely so. Two recent reports paint starkly different pictures of the connectedness of the average U.S. resident. The first, released by Technology Futures of Austin, Texas, states that in 2003, the proportion of American households using broadband of some kind -- DSL, cable or, in some rare cases, wireless -- will surpass 20 percent. More and more people are buying permanent connections to the Net. At the other end of the spectrum, a report published by the Pew Internet & American Life Project indicates the digital divide is still a concern: One-fourth of U.S. residents do not use the Internet at all, including many people who live in homes with wired connections.
An oft-repeated supposition when talking about a new software or hardware product is that in-house IT staff can compensate for what the technology lacks. It's often presumed that somebody on staff can patch, tweak, rejigger or jury-rig technology to make it do what it won't do "out of the box." "Any junior programmer can make that work" is a common refrain.
I won't say I don't receive pitches for the occasional mortgage discount or Vegas vacation, the latest performance-enhancing elixir or anatomical wonder pills. Somehow those untidy and still slightly amusing offenders still wriggle past my defenses. In general, though, I've had good results with a built-in spam stopper in Apple Computer's Mail program, which I've used daily since it was released with the Jaguar update of OS X last year. Amid the frantic hand-wringing over unwanted e-mail, I've heard relatively little mention of this program, so I thought I'd offer my impressions gleaned from nearly 10 months of using the product.
By all indications, Windows Server 2003 is engineered to be more secure than its predecessors. Microsoft has adopted a two-pronged approach to achieving this goal: The company has added several new features intended to boost security, and it has altered the operating system's out-of-the-box settings so that many other features are turned off by default. Will this dual approach help squelch the security problems that have plagued Windows for decades, or does Microsoft still have miles to go?...
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/11/businesspeople-using-ai.jpg
https://www.ecommercetimes.com/story/leveraging-ai-to-transform-actionable-business-strategies-reliably-177998.html
Leveraging AI To Transform Actionable Business Strategies Reliably
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/10/gaming-child.jpg
https://www.ecommercetimes.com/story/new-research-waves-red-flag-over-gaming-scams-aimed-at-kids-179408.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/06/innovative-development.jpg
https://www.ecommercetimes.com/story/surefront-unified-toolkit-modernizes-crm-and-retail-management-177319.html
Surefront Unified Toolkit Modernizes CRM and Retail Management
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/12/business-meeting-ideas.jpg
https://www.ecommercetimes.com/story/morphing-demographics-require-imaginative-pr-strategies-178007.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/11/AI-search.jpg
https://www.ecommercetimes.com/story/ai-search-threatens-digital-economy-warns-researcher-179456.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/09/AI-gift-shopping.jpg
https://www.ecommercetimes.com/story/retailers-turn-to-ai-for-holiday-shopping-season-success-178102.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/08/Roku-The-Trade-Desk-Unified-ID2.jpg
https://www.ecommercetimes.com/story/roku-adopts-cookie-alternative-uid2-to-optimize-its-ad-platform-178071.html
Roku Adopts Cookie Alternative UID2 To Optimize Its Ad Platform
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/09/mobile-wallet.jpg
https://www.ecommercetimes.com/story/mobile-wallets-gain-ground-as-key-complement-to-retail-apps-178099.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2020/03/global-interaction.jpg
https://www.ecommercetimes.com/story/ai-powered-open-commerce-network-could-disrupt-online-retail-178066.html
AI-Powered Open Commerce Network Could Disrupt Online Retail
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/11/business-meeting-discussion.jpg
https://www.ecommercetimes.com/story/2025-looks-like-another-meh-year-for-cx-177396.html
Social Media
See all Social Media