Laptops are the main business tool for most mobile workers, and connecting those devices to the Internet via free public …
‘Gears of War’ bug not SafeDisc DRM’s first
The anti-piracy technology that locked out players of the popular Gears of War game was also implicated in a 2007 …
Human error caused Google search bug
Human error caused a search results glitch that returned the message “this site may harm your computer” for about an …
Google Launches M-Lab Measurement Tools
Google launched a new public service aimed at testing your ISP's practices and performance. The Internet community has been struggling …
Microsoft charges ex-employee with spying
Microsoft Corp. has filed a lawsuit against a former employee, charging him with taking a job at the software company …
What if my storage cloud turns stormy?
Services that store enterprise data in a “cloud” on the Internet raise questions that organizations are just beginning to ask, …
Gartner picks eight mobile techs to watch
Gartner puts Bluetooth 3.0 at the top of the list because it is likely to feature an ultra-low power option …
Dell could join Acer in unveiling smart phone
When Dell Inc. stopped selling the Axim PDA in 2007, several industry observers predicted that the PC and server maker …
Automated healthcare can reduce medical complications
The level of technology deployed by hospitals to help doctors and nurses automate their work can mean the difference between …
AMD set to release DDR3-capable chips
Advanced Micro Devices (AMD) will soon introduce processors that are capable of supporting DDR3 memory, earlier than the company had …
YouTube cookies promts privacy cncerns on Whitehouse.gov
Back when he was campaigning for president, Barack Obama's skillful use of Web 2.0 technologies such as Facebook and YouTube …
How secure is Firefox?
Mozilla's open source Firefox browser has made a significant dent in Internet Explorer's dominant market share. Much of its popularity …
Flavors of Windows 7
Windows Me may not have had much going for it, but it has one claim to fame: It was the …
Securing video surveillance system
Video surveillance was once the exclusive province of physical security; operators looked at multiple video screens, each displaying the field …
Whirlpool chooses IBM for IT services
IBM announced that it has inked a deal to provide Whirlpool with an array of IT and process standardization services …
Full-disk encryption for all computer drives
The world's six largest computer drive makers today published the final specifications(download PDF) for a single, full-disk encryption standard that …
Microsoft pulls PerformancePoint Server after just 15 months
Microsoft said that it was folding its business process management (BPM) software, PerformancePoint Server, into its popular SharePoint Server product. …
Cisco delivers security, storage, UC for small business
The products include security, storage and unified communications platforms (compare unified communications products) designed to be inexpensive and easy to …
IE8 Focuses on Improved Security and Privacy
Microsoft's updated browser, Internet Explorer 8, promises an assortment of new features designed to help make Web browsing with IE …
Monster.com reports theft of user data
Monster.com is advising its users to change their passwords after data including e-mail addresses, names and phone numbers were stolen …