Profile of K.C. Jones
News & Commentary Posts: 1962
Articles by K.C. Jones
posted in February 2006
Big Blue is requesting records relating to the use of Unix code at Sun, Microsoft, and others, their contributions to Linux, and their relationships with SCO.
The Center for Democracy and Technology called for more stringent regulations Wednesday, citing government attempts to retrieve millions of cell phone records, its use of cell phones to track suspects, and other privacy issues.
The contest is part of U.S. Technology Resources' plan to recruit up to 27,000 employees from the region in the next few years.
The goal is to train Gaza residents in everything from computer use to managing networks, to help reduce the 33% unemployment rate among the 1.3 million people living in the region.
The service is expected to go live within the next few months and the entire city will be covered within six months, according to the network's provider.
IBM tools will help government workers identify irregularities that require further investigation.
The software puts search queries into context to cut through information overload.
Homeland Security Secretary chief Michael Chertoff told a U.S. Senate committee that his department needs better communications, software, and hardware.
Only one-third of Internet users who went to dating sites in the last year became paying subscribers, but one company hopes to beat those odds with technology that allows customers to keep their dating activities a secret.
The Department of Homeland Security announced it's completed the 'CyberStorm' simulated computer attacks, but has yet to fully evaluate how effectively the various participating groups communicated, cooperated, and responded.
Researchers have created software that translates network and server activity into music. With it, IT departments can interpret the music to detect problems in the system.
On Wednesday IBM unveiled a nine-core IBM Cell blade, a dual-core POWER processor-based BladeCenterJS21, and an ultra low-power Intel-based BladeCenter HS20.
In his latest protest against the new version of the General Public License, Linux creator Linus Torvalds wrote, "We do not--as software developers--have the moral right to enforce our rules on hardware manufacturers. We are not crusaders."
"Cyber Storm" will simulate a series of network attacks on critical infrastructure in the private sector and in international, federal, and state governments.
Beijing will tag manhole covers in bid to stop rampant thefts.
Within four years, 71% of people with a Web connection will use the Internet to shop, compared with 65% last year, JupiterResearch says.
CA said concerns about outsourcing's impact on research and development are overblown.
A new blog is created every second and the phenomenon has grown 60 times larger than it was three years ago, says Technorati in its periodic State of the Blogosphere report.
IBM and Freescale Semiconductor Inc. have teamed up for open standards development around IBM's Power Architecture.
IBM is offering free software and educational resources for developers in Russia, which has one of the fastest-growing developer populations in the world.
It's just "CA Inc." now, part of a larger overhaul aimed at remaking its image in the wake of accounting scandals.
The Electronic Freedom Foundation is suing AT&T, charging the telecom giant with giving the National Security Agency direct access to a database of private information about AT&T customers.
The idea is to encourage more citizens to 'speak truth to power.'