Is the Internet Broken? Web Veteran Says No
David Clark, senior research scientist at MIT, says he believes the Internet is crumbling under the weight of security problems and it must be rebuilt. Mike Nelson, IBM's director of On Demand Business and former director for technology policy at the FCC, disagrees.
I don't usually cover security-related news here without, of course, an Open Source angle of some sort. But so many fans of open-source software use Winamp -- and so many use it constantly, as part of their daily routines -- that today's zero-day, attack-and-exploit report could be devastating. And now that a patch is available, the best way to prevent the very real possibility that an attacker will turn you
Five Things You Need To Know About VoIP
Thinking of moving to VoIP, or you've already made the switch? Here's some of the things you need to know about efficiency, security, scalability, and how VoIP can help make your company look cool.
Sour Grapes And Cheap Whine
Last week, I discussed the growing momentum Nicholas Negroponte and the One Laptop Per Child project have built lately, especially given the United Nations' .formal endorsement of the project in Davos last Thursday. This week, the other side of the story is emerging -- and it's possible that we may yet see a Certain Unnamed, Very Large Company try to undermine the project, even though OLPC is progressing to the point where such behavior looks increasingly malicious and petty.
According to John
Favorite Firefox Extensions
Other people play Minesweeper or Soduku or alphabetize their Rolodexes. When I'm looking to procrastinate, I mess around with desktop productivity software. Firefox extensions, in particular, are good for endless hours of work avoidance. Here's some of the best I've found recently:
I've received some great feedback on my Firefox extensions article; judging from the number of people reading it, this is just as popular a topic as it has always been. Some readers have emailed asking whether these are my own favorite extensions, or actually my picks specifically for beginning Firefox users -- as I'll explain, it's more the latter. I have also have received two other questions (so far) that I figure enough people will want to
Oracle's Wedding Gift: Siebel Ends On A High Note
Oh, the irony.
After three quarters of anemic earnings, Siebel Systems pulls a rabbit out of the hat just days before its shareholders are set to vote on Oracle's acquisition of the CRM software maker. Revenue through the roof. Profit up the wazoo. License sales at nearly pre-dot-com-bust levels. Larry Ellison must be feeling pretty good about himself about now.
Sun Scores First 'Defensive' Open-Source Success
By making Solaris open-source code, Sun Microsystems has staged the first successful defensive open-source maneuver. I call it the scorched earth approach to open source. Like a smokejumper in front of a forest fire, Sun set a backfire to consume the fuel before the conflagration could reach it.
Google's Long March
It is very easy to spin Google's decision to censor the search results on its new Chinese Web site as a sellout. If you haven't already heard someone crowing over Google's cold, calculating betrayal of its corporate vow to Do No Evil, don't worry -- you will.
Before you buy into this smugfest, however, consider another angle
Tomorrow, The World
Almost everyone who learns about Nicholas Negroponte's effort to distribute millions of laptop computers to kids in developing nations has an opinion about the plan. Surprisingly, it's often a negative opinion: If Negroponte's One Laptop Per Child project (OLPC) ever appeared on the ballot, I would hate to have money riding on the outcome.
Fortunately, that's a non-issue. Negroponte a
Microsoft Takes Baby 'Open' Steps
One way to win back some industry kudos might be to more fully embrace the world of open-source software that Microsoft has long been fighting. Perhaps this is one small step in that direction.
Google, The Sea Monster, And The Big Whirlpool
The headline on today's top story, "Google's Achilles' Heel," references classical mythology. Here's another classical mythology reference that's not mentioned in the story: Scylla and Charybdis.
In Greek mythology, Scylla was a monster who lived on one side of the Strait of Messia. A whirlpool named Charybdis was on the other side of the strait. Ships passing through the channel had to carefully steer a course between the two hazards. If they went too wrong in one direction, the sea monster g
Behind The Times
I know a few professional designers, including some who do user-interface work. As you might expect, they're a pretty tech-savvy bunch -- and they certainly try stay abreast of the latest technology news.
And then, on the other hand, you have the developers and design-firm executives quoted in a recent story about Microsoft's new Expression Graphic Designer tools. I don't know what
Cisco Security Alerts Serve As VoIP Wake-Up Call
Cisco's revelation last week of two security alerts and fixes for CallManager, the processing component of its voice-over-IP technology, is a reminder that there's no getting around VoIP's vulnerability.
Wisconsin Getting Wireless Broadband Network
A high-speed wireless broadband network using Alvarion Ltd. gear and technology is being rolled out in Wisconsin by TDS Metrocom, as the two firms begin eyeing wide regions underserved or not served at all by broadband.
Product Meets Process
Product lifecycle management apps can help you gain control over disjointed activities, but globalization and emerging compliance requirements beg for a more process-oriented approach.
Toward the Personal Work Space
Moving beyond conventional portals -- with their chaos of directories and portlets to disparate applications -- organizations are starting to deliver information in the context of user roles and processes. The challenge is selecting technologies that will create a single, cohesive environment that supports both Web-and thick-client interfaces.
See It Coming
Performance dashboards and scorecards can help you spot what's really important, but they must be pointed in the right direction. Aligned with a coherent business strategy and clear interim objectives, these tools can deliver key performance indicators that will guide employees and partners to appropriate actions. Here's how to pick leading, lagging and diagnostic metrics tied to the right goals.
Security Concerns Mount For Wireless Networks
Security is top-of-mind for businesses managing wireless networks, especially as they start adding new applications, such as voice over IP. Meru Networks' new offering scrambles malicious code at the radio-frequency signal level.
In Focus: Document Scanning and the Enterprise Market
Document imaging was once the exclusive domain of a geeky breed of value-added resellers, imaging-specialized distributors and obscure "integrated document management" vendors. In the past five years, things have changed dramatically.
3 Out Of 4 Block Telemarketing Calls
Most participants in the Federal Trade Commission's Do-Not-Call program say they have seen a drastic decline in telemarketer calls, although they're still getting the calls.
Lucent Trims Predictions, Names New COO
The network equipment maker said Friday that it won't meet its revenue numbers for fiscal 2006. It also named its chief financial officer, Frank D'Amelio, as chief operating officer.
Langa Letter: 5 Essential Steps To PC Security
As the new year begins, Fred Langa says keep these items in mind to help prevent data theft, identity theft, and private information falling into the wrong hands. These steps will give you 365 days of safe computing.