Cisco Threatens Web Site That Leaked Exploit Presentation
Cisco sent a cease-and-desist letter to at least one Web site that posted a leaked copy of an exploit technique against its routers. The technique, which Cisco has been working to suppress in court, was demonstrated publicly at the Black Hat security conference.
Bugs, Crime, And Punishment
Man, oh, man. This past week has been replete with one bug-filled, vulnerable moment after another. Vendors who weren't quashing bugs, or issuing antidotes, were setting out cash or good as same lures to track down even more bugs. The air was virtually thick with repellent and
The First Open-Source Keyboard
I enjoyed Bill O'Brien's piece on new and interesting input devices over at Personal Tech Pipeline. But he missed what may be coolest thing to happen to a keyboard since, well, since there have been keyboards: Artemy Lebedev's Optimus.
When I first laid eyes on this thing about a month ago, I knew I had to have one. Why? If you have to ask, then I can't explain.
For Sale: Iraq's Cell-Phone Franchises
The contracts are lucrative but hazardous: Employees at the three existing Iraq cell phone operations have been kidnapped, and U.S. military forces have had to jam service to prevent insurgent cell phones from detonating bombs.
InterBase: What Was The Chance...
My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.
Embrace, Extend, Annoy
Years ago, I spent enough time dealing with both Quark and its customers to get the gist of that company's end-user support philosophy: sit down, shut up, and do as you're told -- please.
The Internet Worm
Earlier this afternon, I got an interesting email from Bill Whiting, a Linux Pipeline newsletter subscriber. After reading my editor's note -- also availble on the site as today's column, "Analyze This!" -- Bill wrote to suggest that Borland and Cisco might, in fact, have some prominent open-source company: Sendmail, courtesy of a once-infamouse worm that came simply to be known as "The Internet Bug."
The Changing Threat
The days when distributed computing just meant users on different floors sharing the same server are long gone. Thanks to the advent of IP, wireless, and a host of security technologies that have expanded the bounds of the enterprise, a distributed corporate network can wrap around the block or around the world. With that expansiveness comes an incredible flexibility that has spawned entirely new business models.
Motorola Revs Up WiMax Effort To Tackle 4G
WiMax is shaping up as Motorola's lead dog into the world of 4G mobile wireless communications, even as cell phone service providers struggle to implement 3G networks.
In Focus: What's Hot and Not-So-Hot in ECM
The quarterly sport of watching vendor financial results isn't just for industry insiders. These reports are a window into not only what fellow technology users are buying but also the vision and management acumen of current and prospective technology suppliers.
Russian Spammer Murdered
Russian news site MosNews.Com reports that infamous Russian spammer Vardan Kushnir was found dead in his apartment on Sunday, having been apparently beaten to death.
Kushnir reportedly headed several companies, including the Center for American English, the New York English Centre, and the Centre for Spoken English, that sent significant amounts of spam in Russia. According to
Making Deals, Raising Cash
There was a lot of money sloshing around the IT industry last week, with several companies making acquisitions and several others lining up new financing. The buyers were plugging holes in their product portfolios or buying technology. News Corp. bought more than 30 Web sites. Business Objects went for financial-planning and performance-management software. Microsoft grabbed an E-mail-services hosting company. And Broadcom focused on 10 Gigabit Ethernet technology. Meanwhile, venture capital flo
Technology: Can't Leave Home Without It
As my wife, Laura, and I head north to Quebec for a vacation in a few weeks, we'll have a traveling companion: a laptop PC. We aren't alone. Lots of people bring their laptops on vacation.
Snowball, Welcome To Hell
I knew we wouldn't hear much about the usual suspects -- Symantec, McAfee, etc. -- when I set up this week's poll. But it's still interesting to see just how little these products matter to you : Out of about 100 votes so far, just one person says they use proprietary anti-virus sotware on their open-souce desktop system.
Wi-Fi On The Road Leaves A Lot To Be Desired
Despite its unpredictable, frustrating nature, wireless Internet access has become more than just a nice perk available at some savvy hotels. It has become downright necessary to compete for corporate travel business. But based on my experiences with wireless while traveling, there really isn't any reason to rush just yet.
In Focus: Inching Toward the Paperless Office
Today, more than a decade after the mainstreaming of the Internet and two decades since the dawn of the personal computing era, the quest for the paper-free office marches onward.
BPM, Top To Bottom
BPM is just one slice of BI, but it's a critical one with roots that stretch back into the centuries.
Federal Spending On Telecom To Continue Growing
The Department of Homeland Security and E-government are among the drivers that will boost federal telecom spending, according to the government market-research firm Input, which released a study Wednesday.
It Takes More Than Ethical People To Make An Ethical Company
OK, let's get serious, no quips about corporate ethics being an oxymoron. We all know that a lot of the recent regulatory fervor was the result of an unethical few engaging in downright illegal activities. And now we're all wearing this compliance monkey on our backs.
Death To Hackers!
What's the appropriate punishment for convicted hackers, a 21-month suspended sentence including 30 hours of community service, death, or something worse?
Google, Hearst, and Goldman Sachs invest in technology that has yet to catch on
London Web Traffic Buffeted By Attacks
Major London news sites suffered significant performance degradation following Thursday's terror attacks, as readers from across the globe headed to the Web to access information from primary sources.
IT Detours On the Road to BPM
Want deeper business metrics and closed-loop process optimization? Even the best BPM suites still require customization and IT hand holding.
Business Process Management is Under Construction
BPM systems have mastered process integration and automation, so advanced products promise embedded process monitors and feedback mechanisms. With so many vendors checking every feature and function box, we teamed up with sister publication Network Computing for a hands-on comparison of nine BPM suites. We looked at modeling, reporting, business activity monitoring and simulation features and discovered that, for the most part, the road to the future of BPM has yet to be completed.
XML From Office? Microsoft's Open Promise
When Microsoft announced in June that the default file formats in the next-generation Office suite would be based on XML, there was reason to both hope and question whether open computing was headed for a major victory.
M&A Ain't the Only Way
As vendors get busy with mergers and acquisitions, they're usually skimping on product innovation.