Bugs, Crime, And Punishment
Man, oh, man. This past week has been replete with one bug-filled, vulnerable moment after another. Vendors who weren't quashing bugs, or issuing antidotes, were setting out cash or good as same lures to track down even more bugs. The air was virtually thick with repellent and
The First Open-Source Keyboard
I enjoyed Bill O'Brien's piece on new and interesting input devices over at Personal Tech Pipeline. But he missed what may be coolest thing to happen to a keyboard since, well, since there have been keyboards: Artemy Lebedev's Optimus.
When I first laid eyes on this thing about a month ago, I knew I had to have one. Why? If you have to ask, then I can't explain.
Dashboarding From The Bottom Up
A heck of a lot of organizations are rolling out reporting and analytics capabilities to their so-called "line-of-business" workers -- those knowledge employees whose ability to make smart decisions impacts things on the operational level. In other words, the people who really make a business run.
As dashboards spread to more and more folks throughout the organization, one prominent business performance management executive has some advice for companies taking on new dashboard deployments: St
Dashboarding From The Bottom Up
If you're rolling out new reporting capabilities, think about empowering line-of-business workers first, before taking dashboards into the executive suite.
Why Focus On Viruses Here?
You might wonder, as do some of my colleagues here at Techweb, why I’ve given so much space to coverage of ClamAV, the open source anti-virus filter technology. This is, after all Messaging Pipeline, and our focus here is on e-mail, instant messaging, and technology that promotes collaboration through messaging systems. Well, the answer is simple: virus transmission is a messaging phenomenon! In simple terms, we would not have the plague we have today without e-mail and insta
Bloggers Weigh In On India Torrents
Through yesterday and today, parts of India have been hit by what can only be described as rainfall of Biblical proportions.
The city of Mumbai received three feet of rain yesterday. Some major IT outsourcing vendors, including Infosys and Wipro, have closed development centers in the affected areas.
At least one blog out of of India is
InterBase: What Was The Chance...
My last column raised as many new questions as I had when I researched it. This one concerns the back-door login that had been compiled into Borland's InterBase code. If anyone knows the answer, or knows someone who might, give me a shout.
Embrace, Extend, Annoy
Years ago, I spent enough time dealing with both Quark and its customers to get the gist of that company's end-user support philosophy: sit down, shut up, and do as you're told -- please.
The Internet Worm
Earlier this afternon, I got an interesting email from Bill Whiting, a Linux Pipeline newsletter subscriber. After reading my editor's note -- also availble on the site as today's column, "Analyze This!" -- Bill wrote to suggest that Borland and Cisco might, in fact, have some prominent open-source company: Sendmail, courtesy of a once-infamouse worm that came simply to be known as "The Internet Bug."
A few days after I published a column discussing the open-source marvel that is ClamAV, I heard from a PR rep for one of the big anti-virus vendors. I'll leave both his name and the firm's name out of this -- not because they did anything wrong (they didn't) but because I'm going to focus here on a single reference in this email that ultimately opened a much bigger can of worms.
Your Favorite Databases
Readers show a wide range of views when it comes to which databases are the most analytics-friendly.
Find Cell Towers With Google Maps
The popular blog BoingBoing pointed to a site today that combines cell phone tower location information registered with the FCC with Google Maps, enabling you to look zero in on cities and see where the towers are
The Changing Threat
The days when distributed computing just meant users on different floors sharing the same server are long gone. Thanks to the advent of IP, wireless, and a host of security technologies that have expanded the bounds of the enterprise, a distributed corporate network can wrap around the block or around the world. With that expansiveness comes an incredible flexibility that has spawned entirely new business models.
Good Security Means Covering The Basics
Despite all the attention you have to give to phishing and spyware, security leaders can't lose sight of all the mundane, but critical, security requirements, says columnist Wayne Rash.
BI Bullet Points
Want quick advice on the best ways to leverage business intelligence tools? Check out this list.
A Rose By Another Name . . .
A brief article on TechWeb says Microsoft registered domains related to several potential real names for Longhorn before it settled on Windows Vista.
Apparently the company considered calling it "Windows '07" because it registered "windows07.us" and "windowsseven.us." Maybe wiser heads decided that was risky at both ends -- it would mean they'd have to ship it before the end of 2007, which right now doesn't look like a sure thing, and
BI Bullet Points
There's nothing better than a nice business intelligence bullet list.
OK, maybe that's an overstatement. But they're nice. And in case you haven't seen it yet, I've got one for you.
Outsourcing To (Native American) Indians
While the contracting of IT and business-process work to India is hardly news these days, here's an example of Indian outsourcing that is, well, a little different.
Russian Spammer Murdered
Russian news site MosNews.Com reports that infamous Russian spammer Vardan Kushnir was found dead in his apartment on Sunday, having been apparently beaten to death.
Kushnir reportedly headed several companies, including the Center for American English, the New York English Centre, and the Centre for Spoken English, that sent significant amounts of spam in Russia. According to
Two Mergers, Two Circumstances, Two Results
Acquisitions and mergers are a sometimes-wonderful, sometimes-painful fact of enterprise life, and they tend to happen at two distinctly different times in the life of an industry and in the lives of companies in that industry: at the beginning, and at the end. At the beginning, companies that are growing in related, but distinct arenas of a growing industry can often find growth-giving synergy by merging their technological, intellectual, and manufacturing assets. At the end, companies that are
IBM Execs Just Wanna Have Fun
IBM, of all companies, is blogging about the future of gaming. IBM. Blogging. About gaming. The blog, called GameTomorrow, launched yesterday.
You Wow Us With Your Prose
Your entries to The Great Tech Call-'Em-Like-You-See-'Em Contest were entertaining, well-written, and a lot of fun to read--and we learned a little about you in the process.
Bye-bye Longhorn, Hello Vista
This just in: Redmond, Washington, July 22, 2005 -- Today Microsoft Corp. announced the official name of its next-generation Windows client operating system, formerly code-named "Longhorn:" Windows Vista.
And the delivery date of Beta 1, targeted at developers and IT professionals, has been officially pegged for August 3. Get those fingers on the download buttons.
Official marketing slogan: "Bringing clarity to your world."
Official Web site:
Technology: Can't Leave Home Without It
As my wife, Laura, and I head north to Quebec for a vacation in a few weeks, we'll have a traveling companion: a laptop PC. We aren't alone. Lots of people bring their laptops on vacation.
One Fast Clam
A lot of companies these days will try almost any kind of open-source software, including once-sacrosanct three-letter enterprise apps. Many of these people, however, still apply one big exception to their open-minded approach to open-source: anti-virus tools. Find out why they couldn't be more wrong.
Snowball, Welcome To Hell
I knew we wouldn't hear much about the usual suspects -- Symantec, McAfee, etc. -- when I set up this week's poll. But it's still interesting to see just how little these products matter to you : Out of about 100 votes so far, just one person says they use proprietary anti-virus sotware on their open-souce desktop system.
Business Technology: U.N. Snatches Internet; Tomorrow All IT?
In a phony-but-it-could-be-real memo, a confidential operative for The Private Sector warns CIOs and CEOs that the United Nations' recent posturing to take over the Internet is only a tiny hint at its larger intent: to seize control of all IT systems, networks, software, and processes in the world!
Money Where Its Mouth Is
Consulting firm Accenture sees the market for information management services swelling beyond $27 billion by 2007, and it's slapping down big money for a piece of the action.