Is the Internet Broken? Web Veteran Says No
David Clark, senior research scientist at MIT, says he believes the Internet is crumbling under the weight of security problems and it must be rebuilt. Mike Nelson, IBM's director of On Demand Business and former director for technology policy at the FCC, disagrees.
Watch Out For The Worm
A vicious worm - the My Wife/Kama Sutra/Blackworm - is getting set to rear its ugly head this Friday the 3rd when it will arrive on unprotected PCs and destroy Microsoft Office files. Though experts have been sounding alarms for a couple of weeks about the malware which infects PCs once unsuspecting users open an email attachment and Microsoft issued a
More Guidance On Regulations
We can all use a little guidance when it comes to identifying how regulations will affect our business processes and IT environments. The hard part is figuring out how compliance requirements change based on geographic variables and vertical markets.
And such guidance is starting to emerge. Two directories/guides were recently announced; both are free after registration, but only one is currently available.
The Object Management Group (OMG) and the OMG Regulat
I don't usually cover security-related news here without, of course, an Open Source angle of some sort. But so many fans of open-source software use Winamp -- and so many use it constantly, as part of their daily routines -- that today's zero-day, attack-and-exploit report could be devastating. And now that a patch is available, the best way to prevent the very real possibility that an attacker will turn you
Five Things You Need To Know About VoIP
Thinking of moving to VoIP, or you've already made the switch? Here's some of the things you need to know about efficiency, security, scalability, and how VoIP can help make your company look cool.
Sour Grapes And Cheap Whine
Last week, I discussed the growing momentum Nicholas Negroponte and the One Laptop Per Child project have built lately, especially given the United Nations' .formal endorsement of the project in Davos last Thursday. This week, the other side of the story is emerging -- and it's possible that we may yet see a Certain Unnamed, Very Large Company try to undermine the project, even though OLPC is progressing to the point where such behavior looks increasingly malicious and petty.
According to John
Favorite Firefox Extensions
Other people play Minesweeper or Soduku or alphabetize their Rolodexes. When I'm looking to procrastinate, I mess around with desktop productivity software. Firefox extensions, in particular, are good for endless hours of work avoidance. Here's some of the best I've found recently:
I've received some great feedback on my Firefox extensions article; judging from the number of people reading it, this is just as popular a topic as it has always been. Some readers have emailed asking whether these are my own favorite extensions, or actually my picks specifically for beginning Firefox users -- as I'll explain, it's more the latter. I have also have received two other questions (so far) that I figure enough people will want to
Oracle's Wedding Gift: Siebel Ends On A High Note
Oh, the irony.
After three quarters of anemic earnings, Siebel Systems pulls a rabbit out of the hat just days before its shareholders are set to vote on Oracle's acquisition of the CRM software maker. Revenue through the roof. Profit up the wazoo. License sales at nearly pre-dot-com-bust levels. Larry Ellison must be feeling pretty good about himself about now.
Sun Scores First 'Defensive' Open-Source Success
By making Solaris open-source code, Sun Microsystems has staged the first successful defensive open-source maneuver. I call it the scorched earth approach to open source. Like a smokejumper in front of a forest fire, Sun set a backfire to consume the fuel before the conflagration could reach it.
Learning From The Best Of Business - And The Worst Of The Web
Seriously, is there really anything more irritating on the Web than those distracting graphical ads that rise over the Web page you are on, obscuring the text you are reading from view? Well, odd as it seems, the graphical overlay ads that drive most people crazy on the public Web turn out to be quite effective when incorporated into corporate Intranet sites, at least according Jakob Nielsen, principal of the Nielsen Norman Group. The N
Can StopBadware Save The Universe From ... 'Badware'?
It's debatable whether StopBadware.org's education campaign against deceptive adware, spyware, and other malware will provide much of a counterweight against the growth of the lucrative adware/spyware industry, given that this software is often installed without the user's knowledge and is difficult to remove. Launched this week, this group of tech industry leaders, academics, and consumer advocates certainly
Google's Long March
It is very easy to spin Google's decision to censor the search results on its new Chinese Web site as a sellout. If you haven't already heard someone crowing over Google's cold, calculating betrayal of its corporate vow to Do No Evil, don't worry -- you will.
Before you buy into this smugfest, however, consider another angle
Keep The Knives Away From Storage
Will storage concerns outweigh security this year? It seems like a stretch but that's what a recent survey by Glass House Technologies indicates. According to Glass House's "2006 Storage Budget Survey", 2006 will be a year for holding down costs and that means IT will be wringing out more efficiency from storage architectures.
Now, Glass House is a provider of independent services that help organizations solve enterprise storage problems and focuses on in
Tomorrow, The World
Almost everyone who learns about Nicholas Negroponte's effort to distribute millions of laptop computers to kids in developing nations has an opinion about the plan. Surprisingly, it's often a negative opinion: If Negroponte's One Laptop Per Child project (OLPC) ever appeared on the ballot, I would hate to have money riding on the outcome.
Fortunately, that's a non-issue. Negroponte a
Microsoft Takes Baby 'Open' Steps
One way to win back some industry kudos might be to more fully embrace the world of open-source software that Microsoft has long been fighting. Perhaps this is one small step in that direction.
Single Sign-On Is A Myth
The brass ring in identity management is to create one universal user identity per employee, contractor, or business partner that can be managed centrally and recognized by all applications, operating systems, and databases that a user encounters. But it's a fool's gold for companies to think that they can achieve "single sign-on" capabilities for their users, Dennis Brixius, the McGraw-Hill Cos. VP and chief security officer, said Tuesday at an identity-management seminar hosted by Oracle. Give
Google, The Sea Monster, And The Big Whirlpool
The headline on today's top story, "Google's Achilles' Heel," references classical mythology. Here's another classical mythology reference that's not mentioned in the story: Scylla and Charybdis.
In Greek mythology, Scylla was a monster who lived on one side of the Strait of Messia. A whirlpool named Charybdis was on the other side of the strait. Ships passing through the channel had to carefully steer a course between the two hazards. If they went too wrong in one direction, the sea monster g
Behind The Times
I know a few professional designers, including some who do user-interface work. As you might expect, they're a pretty tech-savvy bunch -- and they certainly try stay abreast of the latest technology news.
And then, on the other hand, you have the developers and design-firm executives quoted in a recent story about Microsoft's new Expression Graphic Designer tools. I don't know what
IT Gets Strategic
IT as a profit center? Well, maybe not today, but it does appear corporate execs want technology to play a greater strategic role in the business than in the past, at least judging from the results of a recent Gartner survey of 1,400 CIOs in which the respondents said they are increasingly being expected to do much more than help reduce corporate costs and guarantee information security. The Gartner found that business execs have
If Compliance Costs Are Still Rising, Something Is Wrong
Analysts and vendors have been telling us Sarbanes-Oxley compliance costs should go down each year, but in a recent reader poll, more than half of our respondents claimed they are expecting just the opposite. A third of respondents did, however, expect their compliance costs will go down this year.
That tells me one of three things is happening: Either the promised return on investment from tools already applied to the p
Last week's Systems Management Pipeline Poll asked if your organization has the security tools and policies in place to sufficiently protect your customer, employee, and other confidential enterprise data, and unfortunately, the answer was largely no. Given the number of high-profile incidents and the expectation that pending legislation will hold more busines
Cisco Security Alerts Serve As VoIP Wake-Up Call
Cisco's revelation last week of two security alerts and fixes for CallManager, the processing component of its voice-over-IP technology, is a reminder that there's no getting around VoIP's vulnerability.
Wisconsin Getting Wireless Broadband Network
A high-speed wireless broadband network using Alvarion Ltd. gear and technology is being rolled out in Wisconsin by TDS Metrocom, as the two firms begin eyeing wide regions underserved or not served at all by broadband.
Paint Another Target On Cisco As Enterprise VoIP Grows
Cisco's revelation Wednesday of two security alerts and fixes for CallManager, the software-based call-processing component of its IP communications technology, could have washed waves of despair over the budding voice-over-IP market. That is, if it had been the first whiff of security trouble for VoIP. The ability to launch denial-of-service attacks against VoIP networks, Cisco VoIP networks in particular, is nothing new. The real concern is holding the line against damage inflicted by VoIP att
Going On The Offensive
Information security tends to rely on defensive measures, for pretty obvious reasons. A virus outbreak occurs, a patch is released. However, as many organizations are discovering the best defense is really a good offense. Enterprises need to get proactive to defend themselves effectively against threats such as bots that take over systems without the user's permission.
Holy_father Delivers Rootkits To The Masses
The futility of today's model for antivirus protection is fairly obvious. Plug one hole in the dike and another will sprout. Pretty soon, you're running out of fingers and toes to hold back the flood. It gets worse. Attackers without the skill to create their own malicious hacks can outsource their dirty business to others who will write the code for them and then offer services that keep these rootkits from being detected. It's the virtual version of Spy vs. Spy, with many black hats claiming t
Product Meets Process
Product lifecycle management apps can help you gain control over disjointed activities, but globalization and emerging compliance requirements beg for a more process-oriented approach.
Toward the Personal Work Space
Moving beyond conventional portals -- with their chaos of directories and portlets to disparate applications -- organizations are starting to deliver information in the context of user roles and processes. The challenge is selecting technologies that will create a single, cohesive environment that supports both Web-and thick-client interfaces.