|
LG, Samsung under investigation for Kodak patent infringement
The U.S. International Trade Comission is investigating a complaint by Kodak charging LG and Samsung with patent infringement.
Read more...
Judge denies most SAP motions to dismiss in Oracle suit
Cisco: Cyberattacks growing, looking more legit
Critics to ICANN: Top-level domain sale dangerous, costly
Cisco sued for copyright infringement over Linksys router
Apple code crashes, locks up Mac clones, Psystar claims
A brief tour of the software pirate underground scene
Is SaaS and the recession killing perpetual software licenses? No, say experts
De Beers tries to force spoof news Web site offline over fake ad
Microsoft targets 'Blue Edition' software sales scams
More Intellectual Property and DRM Stories
DRM-free Apple rumors still just sound and fury
If you listen to the Internet -- and I don't recommend you listen too closely, as it will drive you mad as surely as if you were privy to the whispers of the vast underdeeps -- then you'd have good reason to think that Apple was going to unleash the rest of its vast iTunes catalog in a DRM-free format on Tuesday.
Opinion: Death of the album -- the weak spot in SanDisk's plan
For some reason, record companies -- and some of their partners in the hardware and software industries -- keep trying to promote an outdated business model: the album.
In the land of cheese, tulips and biometrics
The Netherlands' innovative use of biometrics improves customer service and reduces fraud.
Protecting your .Net app from would-be plagiarizers
Developers using Java, .Net and the like find themselves contending with unscrupulous code cribbers, who lift everything but the comments from their hard word. A company called Xenocode has a means of fighting back.
Opinion: Getting to governance
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Jon Espenschied describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected.
Security goes to the movies: Iron Man
Time once again for "Security Goes to the Movies," a leisurely look at the inevitable bleeding from the eyes that security folk experience when Hollywood takes liberties with tech, the laws of physics and other aspects of reality. Our shiny and metallic subject today is Iron Man.
Campus Whispers
Universities need to be more proactive — and vocal — in dealing with their students' use of peer-to-peer file-sharing networks for illegal downloads.
Opinion: A spring cleaning for security
The column undertakes spring cleaning as the writer checks in on issues raised by "In Security" over the past year. He's got good news and bad news...
Torvalds: Microsoft is bluffing on patents
Linux kernel creator Linus Torvalds expressed doubt that interoperability advocates at Microsoft can triumph and ambivalence about Sun's recent overtures to the open-source movement in a recent interview with the Linux Foundation's Jim Zemlin.
The 7 most annoying developments in software
From product keys to click behavior, application developers need to stop annoying their users.
"Privacy groups have long worried about Google's privacy policies --- and now it appears that consumers have followed suit. Google..."
Read more "When all the terminals at this company suddenly stop responding, this pilot fish soon finds the problem's cause -- and..." Read more "The defunct McCain-Palin campaign is selling off the assets, and an investigative journalist from a FOX affiliate was able to..." Read more More Security Blogs See all Computerworld Blogs |
Virtualizing Microsoft Exchange Download now! |
For Congress to do anything that helps protect consumers and the critical Internet infrastructure as a whole, it must pass laws that require proactive processes to protect computers, not that tell people how to deal with the resulting mess, says Ira Winkler. Click here to read the latest column by Ira Winkler |
| ||
| ||
| ||
|
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Our columnist describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected. Click here to read the latest column by Jon Espenschied |
About Us Advertise Contacts Editorial Calendar Help Desk Jobs at IDG Privacy Policy Reprints Site Map |
CIO The Industry Standard |