If you are reading this article, chances are you own a pocket PC or Palm-based smartphone or PDA. Chances are also great that you are in desperate need for a mobile Web solution. Since the dawn of the Internet, transferring and receiving information has been the ultimate goal. PDAs and smartphones h...
What's most important to consumers when making a purchase online? Personal identity. Consumers are taking more notice of their individual online security after a string of recent identity theft cases made major headlines. According to a recent survey by University of Southern California's Center f...
Cisco is going green, and now the information technology networking giant is helping cities turn green, too. At the center of the effort is the Connected Urban Development Global Conference in San Francisco this week, where Cisco Chairman and Chief Executive Officer John Chambers in a keynote addres...
A partnership between Texas Instruments and the Massachusetts Institute of Technology has produced a proof-of-concept microchip architecture that is 10 times more efficient than current technologies. The design -- which was presented on Tuesday at the International Solid-State Circuits Conference --...
WiFi was supposed to effortlessly connect us to the world on the run. Instead we're all on the run seeking a connection. We skip from airport to coffee shop, from cell connection to hotel hook-up, constantly trying to pace connects and disconnects with our physical location of the moment. We are, in...
The growing popularity of Software as a Service is having a significant impact on data security and regulations compliance. Most companies are concerned -- and rightly so -- about the legal and security issues raised when company data is located outside their firewall. Software as a Service is incre...
Study after study continues to reveal a fundamental truth about the shifting landscape of IT security today: The biggest threat to proprietary systems and information is not the traditional cyber-criminal writing malicious code in a virtual location, but rather trusted employees. Savvy administrator...
The Software Freedom Law Center is challenging Verizon's use of BusyBox open source code in the wireless routers provided to its FiOS customers. SFLC has filed suit against Verizon in the U.S. District Court of New York on behalf of BusyBox developers Erik Andersen and Rob Landley, alleging that the...
If you think accessing Internet data can be slow today, wait until 2010. That's when the Internet information glut could become unmanageable for corporate IT managers and users of enterprise applications, as well as consumers, according to Nemertes Research. In fact, according to Nemertes, avoiding ...
The day has come. Fingerprint biometrics is real technology for real people. Spurred by the size and cost advantages of fingerprint sensors and a growing need for security, biometric fingerprint technology is being integrated into more and more devices, including laptop PCs from the leading manufact...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.