Business Technology News and Commentary - InformationWeek
News & Commentary
Content tagged with PC & Servers posted in September 2006
An HP Blow-By-Blow
Commentary  |  9/28/2006  | 
As soon as Patricia Dunn walked into Room 2123 of the Rayburn Building here on Capitol Hill, camera shutters went off like machine guns, all directed at the former Hewlett-Packard chairwoman, her curt dark hair, and her beige pantsuit. But the throngs of paparazzi stalking dark- and beige-suited business types alike before (and during, especially at the short lunch break) today's congressional hearings on Hewlett-Packard's probes into boardroom leaks and so-called "
To Boldly Go Where No Mascara-Wearing Captain Has Gone Before
Commentary  |  9/28/2006  | 
We'll forgive you if you want to start Cory Doctorow's latest column with the last paragraph on the second page. That's where Cory starts to talk about how Hollywood is unprepared to deliver video that takes advantage of the new high-definition TV screens. Most existing video looks terrible in high-def, and directors don't know how to use the new medium correctly. I laughed out loud at Cory's
Consumer Tech In IT? Why Not?
Commentary  |  9/27/2006  | 
This notion of consumer-meets-corporate isn't new, of course. An InformationWeek cover story from March talked about how companies can tap into the energy of consumer technologies from MP3 players to cell phones. Mostly this hasn't happened; security concerns and tightened IT budgets, not to mention good-old-fashioned fear of the unknown, have conspired against this. But the wall between the two is sta
HP Sponsors Privacy Award
Commentary  |  9/25/2006  | 
The International Association of Privacy Professionals and HP are sponsoring the 2006 IAPP Innovation Awards to recognize "three organizations that demonstrate high levels of integration of privacy protection throughout their entire business process." Yes, HP, the company that hired outside security firms to violate the privacy of its bo
Where Did HP Cross The Line?
Commentary  |  9/22/2006  | 
It's been another week of revelations about Hewlett-Packard's investigation into media leaks. Another week of unflattering details about illicit spying tactics, phony personas to dupe the press, and even e-mail tampering. With everything that HP reportedly did in its zealous probe to find a media leak, exactly where did company executives cross the line? How big is the gray area of what's legal and what's ethical? And what's just way over the line?
Quad Core Should Be In Intel Developer Forum Spotlight
Commentary  |  9/22/2006  | 
Expect quad-core microprocessors to be heard from early and often at the Intel Developer Forum (IDF) next week in San Francisco. Intel could even further accelerate the timeline for the industry's first quad-core x86 microprocessors with a formal introduction in front of press and friends. After getting strong reviews for its recently introduced Core architecture-based processors for both PCs and servers, Intel may see an opportunity to seize momentum from rival Advanced Micro Devices.
If E-Voting Is A Gamble, Could Web-Based Voting Be In The Cards?
Commentary  |  9/20/2006  | 
This election season, you may be one of the approximately 60 million American voters who will be casting a vote using new computerized systems at your local polling place. However, in the future, you might be casting your vote using your home PC and the Internet. That's what some U.S. election officials predict.
Apple's Future Phone
Commentary  |  9/15/2006  | 
It's pretty much a given these days that Apple is hard at work on a mobile phone. The company won't acknowledge this, but it's hard to find an Apple rumor site or financial analyst covering Apple that hasn't speculated about the iPhone or whatever the fabled device eventually ends up being called. Despite its studied coyness, Apple in
Desktop Defectors
Commentary  |  9/12/2006  | 
Recently, I wrote a story about the vulnerabilities of Web applications in which Alan Paller, director of research at the SANS Institute, predicted, "Security will drive people to centralized applications." That's in fact what I'm hearing from some of the attendees at the 2006 InformationWeek Fall Conference. The difficulty
Decisions, Decisions
Commentary  |  9/7/2006  | 
I don't know about you, but whenever I go to Dell's, HP's, or any other major PC manufacturer's Web site to look at new computers, I get a little overwhelmed with all the decisions I have to make. Do I want a home office or a small business computer? Media center capabilities or a machine that's all business? And those are the easy questions--after that come the big decisions: CPU and memory.
Bungling Bureaucrats And IT Debacles
Commentary  |  9/6/2006  | 
Just when you think the business and IT incompetence of bureaucrats can't get any more profound, they come roaring back to exceed our expectations.

How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll