Cisco Threatens Web Site That Leaked Exploit Presentation
Cisco sent a cease-and-desist letter to at least one Web site that posted a leaked copy of an exploit technique against its routers. The technique, which Cisco has been working to suppress in court, was demonstrated publicly at the Black Hat security conference.
Telcos Give Bundling Another Try
Firms are bundling telecom services, including local, long distance and cell phones, Internet, and TV. Will customers go for it?
The First Open-Source Keyboard
I enjoyed Bill O'Brien's piece on new and interesting input devices over at Personal Tech Pipeline. But he missed what may be coolest thing to happen to a keyboard since, well, since there have been keyboards: Artemy Lebedev's Optimus.
When I first laid eyes on this thing about a month ago, I knew I had to have one. Why? If you have to ask, then I can't explain.
Why Focus On Viruses Here?
You might wonder, as do some of my colleagues here at Techweb, why I’ve given so much space to coverage of ClamAV, the open source anti-virus filter technology. This is, after all Messaging Pipeline, and our focus here is on e-mail, instant messaging, and technology that promotes collaboration through messaging systems. Well, the answer is simple: virus transmission is a messaging phenomenon! In simple terms, we would not have the plague we have today without e-mail and insta
For Sale: Iraq's Cell-Phone Franchises
The contracts are lucrative but hazardous: Employees at the three existing Iraq cell phone operations have been kidnapped, and U.S. military forces have had to jam service to prevent insurgent cell phones from detonating bombs.
InterBase: What Was The Chance...
My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.
Embrace, Extend, Annoy
Years ago, I spent enough time dealing with both Quark and its customers to get the gist of that company's end-user support philosophy: sit down, shut up, and do as you're told -- please.
The Internet Worm
Earlier this afternon, I got an interesting email from Bill Whiting, a Linux Pipeline newsletter subscriber. After reading my editor's note -- also availble on the site as today's column, "Analyze This!" -- Bill wrote to suggest that Borland and Cisco might, in fact, have some prominent open-source company: Sendmail, courtesy of a once-infamouse worm that came simply to be known as "The Internet Bug."
The Changing Threat
The days when distributed computing just meant users on different floors sharing the same server are long gone. Thanks to the advent of IP, wireless, and a host of security technologies that have expanded the bounds of the enterprise, a distributed corporate network can wrap around the block or around the world. With that expansiveness comes an incredible flexibility that has spawned entirely new business models.
Motorola Revs Up WiMax Effort To Tackle 4G
WiMax is shaping up as Motorola's lead dog into the world of 4G mobile wireless communications, even as cell phone service providers struggle to implement 3G networks.
In Focus: What's Hot and Not-So-Hot in ECM
The quarterly sport of watching vendor financial results isn't just for industry insiders. These reports are a window into not only what fellow technology users are buying but also the vision and management acumen of current and prospective technology suppliers.
Making Deals, Raising Cash
There was a lot of money sloshing around the IT industry last week, with several companies making acquisitions and several others lining up new financing. The buyers were plugging holes in their product portfolios or buying technology. News Corp. bought more than 30 Web sites. Business Objects went for financial-planning and performance-management software. Microsoft grabbed an E-mail-services hosting company. And Broadcom focused on 10 Gigabit Ethernet technology. Meanwhile, venture capital flo
Two Mergers, Two Circumstances, Two Results
Acquisitions and mergers are a sometimes-wonderful, sometimes-painful fact of enterprise life, and they tend to happen at two distinctly different times in the life of an industry and in the lives of companies in that industry: at the beginning, and at the end. At the beginning, companies that are growing in related, but distinct arenas of a growing industry can often find growth-giving synergy by merging their technological, intellectual, and manufacturing assets. At the end, companies that are
Technology: Can't Leave Home Without It
As my wife, Laura, and I head north to Quebec for a vacation in a few weeks, we'll have a traveling companion: a laptop PC. We aren't alone. Lots of people bring their laptops on vacation.
Snowball, Welcome To Hell
I knew we wouldn't hear much about the usual suspects -- Symantec, McAfee, etc. -- when I set up this week's poll. But it's still interesting to see just how little these products matter to you : Out of about 100 votes so far, just one person says they use proprietary anti-virus sotware on their open-souce desktop system.
Wi-Fi On The Road Leaves A Lot To Be Desired
Despite its unpredictable, frustrating nature, wireless Internet access has become more than just a nice perk available at some savvy hotels. It has become downright necessary to compete for corporate travel business. But based on my experiences with wireless while traveling, there really isn't any reason to rush just yet.
In Focus: Inching Toward the Paperless Office
Today, more than a decade after the mainstreaming of the Internet and two decades since the dawn of the personal computing era, the quest for the paper-free office marches onward.
BPM, Top To Bottom
BPM is just one slice of BI, but it's a critical one with roots that stretch back into the centuries.
SmartAdvice: ERP Systems Move To Professional Services
Match ERP tools with your business strategy and chose an industry-tailored system, The Advisory Council says. Also, align network-support staffing levels first with network-management processes and network-planning and -architecture processes, then with technical specialties.
Federal Spending On Telecom To Continue Growing
The Department of Homeland Security and E-government are among the drivers that will boost federal telecom spending, according to the government market-research firm Input, which released a study Wednesday.
ICANN Approves .mobi Domain For Cell Phones
The move is expected to pave the way for widespread use of the Web by cell phone users, although ICANN representatives have said they doubt .mobi websites will be available before 2006.