Renewed interest in biometric security is heating up the cell phone industry in Asia. Industry watchers report that advanced security devices using biometrics are already popular in technology hungry countries in Asia and Europe. However, new biometric products already available to businesses and co...
Denial of service (DoS) attacks get all the press, but stealth attacks are the ones to really worry about. What are some of these attacks (with colorful names like "Bot" and "Zombie"), and how can you determine if your site has been compromised? Unfortunately, on the Internet, there is no real borde...
One would not call them intimate at this stage, but certainly the mutual interest between wireless LANs and video applications is growing. Companies and consumers have deployed a growing number of WLANs to support a variety of data applications, such as electronic mail and Web browsing. Users are st...
The Voice over IP landscape has changed considerably in the last few years. The easy availability of broadband access to the Internet, coupled with Herculean leaps in technology, makes VoIP service a viable alternative to traditional telephone and PBX offerings. Today's VoIP services offer a variety...
Spyware is so prevalent that it is becoming nearly impossible to find computers that do not contain at least some intrusive code lurking on the hard drive or buried deep within the Windows Registry. Spyware is any technology that aids in gathering information about a person or organization without t...
The quest for more bandwidth is neverending, so soon after vendors make one technical advance, they move on to the next. With 54 Mbps 802.11g wireless LANs now poised to gain a lion's share of product shipments, vendors are examining ways to push the bandwidth plateau past the 100 Mbps mark. Proprie...
Internet security firms are gearing up for an onslaught of new attacks that hackers will hurl at inboxes and against Web sites. As the computer industry awaits the release of Service Pack 2 of Microsoft's Windows XP -- which will feature improved security capabilities -- hackers are waiting too. The...
The sight of commuters' heads bobbing up and down as they listen to music on their way to work may be replaced by intent gazes examining the previous night's episode of the "Sopranos" or the ninth inning of the baseball game. Manufacturers are hoping that the next big wave in personal entertainment ...
Consumer devices, such as entertainment systems and home security products, are gaining intelligence and becoming more PC-like. As this occurs, users want to connect them to home local area networks and automate processes, such as moving music files from PCs to stereos or turning lights on and off.
College students across the U.S. are majoring in a new technology: wireless connectivity. It is a subject they are learning hands-on and using everywhere they go on campus. Of course, wireless connectivity is not a credit-bearing subject on a long list of prerequisites to earn their degrees. Instead...
Yes - I'm more likely to buy with flexible payment options.
Sometimes - It depends on the item and terms.
Rarely - I typically prefer paying upfront to avoid debt.
Not at All - My purchase decisions are based on need and budget.
Enter your Username and Password to sign in.