Linksys Releases Wireless-N For Small Businesses
The local area network product line uses the 802.11n wireless draft specification, designed to better handle bandwidth-hungry apps like video and VoIP. Still, there's no assurance they'll work with other products using that spec.
AEP, Lockdown Partner
Lockdown Networks and AEP Networks announced they have entered into a technology licensing, co-development and marketing partnership
Covi Lands $15M
Covi Technologies announced that it has secured $15 million in additional funding
Apple's Copy Protection Isn't The Problem
Cory Doctorow, noted sci-fi writer and Boing Boing editor, marshals a strong argument against digital rights management in InformationWeek. But his assertion that there's no good DRM oversimplifies an issue that's best framed in compromises rather than absolutes.
Apple's DRM has benefited the public and the music industry. It
ERP Makeover: The Pig's Next Gig
Enterprise resource planning software--despite a long record of achievement in business process improvement--suffers from a lingering image problem. It's that ERP projects have a tendency to become resource hogs that waddle over budget and past deadline. New software in development by SAP, Oracle, and Microsoft promises to overcome the drawbacks of the past. But will ERP really get easier to deploy and manage? Or are ERP vendors merely putting lipstick on a pig?
VoIP Call Quality Takes A Nosedive: Survey
VoIP call quality has taken a nosedive over the last 18 months, with nearly 20% of VoIP callers experiencing unacceptable voice quality, according to a survey done by Brix Networks.
Bringing A Business Sensibility To IT
It goes without saying that the entire reason a company invests in technology is to support its business goals. But too often there is a disconnect between corporate operations and the IT organization. This is unfortunate because it prevents businesses from getting the maximum value from their technology resources.
This business of paying for software bugs has plenty of pros and cons and won't necessarily improve security
Kernel Blocks 3rd Parties
Security experts at Agnitum announced that Micro's attempt to improve security instead is a possible move to block the use of third-parties
Who Owns The Internet?
The key questions, which I hope are addressed in the hearing this week, are exactly what the Department of Commerce originally intended when it decided to work with ICANN back in 1998, whether those intentions have changed, and whether the requirements of the American business community have changed--or perhaps should change in its own best interests.
Software Assist Monitors FTP
Software Assist announced the addition of a real-time FTP usage monitoring agent for distributed systems platforms
Interesting Spam Article
"The State Of Spam," by Christopher Heun, provides a good catch-up on current spam volume, its changing nature, and current enforcement activities (governmental and private sector alike). It's a must-read for anybody who deals with junk e-mail on a daily basis.
Intel Makes Branding Gamble With 'Leap Ahead' And Core 2 Duo
The next year will determine if Intel's processor portfolio overhaul of the past few weeks will successfully put the brakes on rival Advanced Micro Devices' market share assault of the past two years. But AMD executives believe Intel has again made a big error in giving up positions of strength by abandoning two of the most well-known brands in the technology industry: Intel Inside and Pentium.
Barracuda Attacks Image-Based Spam
Yesterday Barracuda Networks announced an upgrade to its Spam Firewall product that provides the ability to apply optical character recognition, or OCR, techniques to incoming e-mail. This is an important escalation in the spam/anti-spam arms race, and something that will hopefully become more common.
Will You Join The DRM Dance?
Back in the bad old days of the 1970s, Sony came out with a wonderful machine called a Betamax video tape recorder. The idea was that consumers could tape their favorite programs off of their televisions and watch them at their leisure. No longer would people have to rush home in a panic in order to catch that week's episode of Star Trek--you could watch Johnny Carson at 9 a.m. and your favorite daytime soap at 1 a.m. if you wanted.
But Universal City Studios didn't see it that way.
ZipLip announces Version 5.2 of its Unified Email Archival Suite
Vonage Denies Spyware Charges
Vonage denies that it uses spyware to deliver its advertising, as charged yesterday by spyware researcher Ben Edelman.
Burton Releases Report
Burton Group released a report that analyzes the FFIEC guidance on authentication for Internet banking
Compuware Ships 2.5
Compuware DevPartner SecurityChecker 2.5 is now generally available and shipping
PortAuthority Names VP
PortAuthority Technologies has named former Juniper Networks sales executive Ron DiBiase as its VP of worldwide sales
Microsoft Makes Its Peace With Open Source
Last month, I noted in the Linux Pipeline newsletter that Microsoft's new leadership was likely to adopt a far more pragmatic, and positive, attitude towards open-source software. I was right about what would happen, but wrong about the timing: In just two weeks, with two decisions, Microsoft has already largely demolished years of anti-Open Source dogma.
Hiring Hackers: Would You Ever Trust Your Network Security To An Ex-Thief?
As the saying goes, if you can't beat them join them. But in the case of ex-hackers who abandon their criminal lives to pursue careers in corporate security, these security wizards often have already beaten the system and are now choosing to exploit it further by profiting from the expertise they gained at the expense of the organizations they once menaced.
Vonage Ads Delivered Via A Dozen Spyware Makers: Report
Anti-spyware researcher Ben Edelman, in his most recent newsletter, charges that Vonage advertising appears in ads from at least a dozen sources he identifies as spyware makers. He also says there's plenty Vonage could do to stop the practice.
AppGate Evals Server
AppGate Network Security announced that it is working with atsec information security for the evaluation of the Security Server V.7
Cambia Integrates PCI
Cambia Security announced that Cambia CM now includes prescriptive asset configuration policies