(Go: >> BACK << -|- >> HOME <<)

Computerworld
Quick Menu
Search



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

LG, Samsung under investigation for Kodak patent infringement
The U.S. International Trade Comission is investigating a complaint by Kodak charging LG and Samsung with patent infringement. Read more...

Judge denies most SAP motions to dismiss in Oracle suit

Cisco: Cyberattacks growing, looking more legit

Critics to ICANN: Top-level domain sale dangerous, costly

Cisco sued for copyright infringement over Linksys router

Apple code crashes, locks up Mac clones, Psystar claims

A brief tour of the software pirate underground scene

Is SaaS and the recession killing perpetual software licenses? No, say experts

De Beers tries to force spoof news Web site offline over fake ad

Microsoft targets 'Blue Edition' software sales scams

More Intellectual Property and DRM StoriesMore Top Stories

DRM-free Apple rumors still just sound and fury
If you listen to the Internet -- and I don't recommend you listen too closely, as it will drive you mad as surely as if you were privy to the whispers of the vast underdeeps -- then you'd have good reason to think that Apple was going to unleash the rest of its vast iTunes catalog in a DRM-free format on Tuesday.

Opinion: Death of the album -- the weak spot in SanDisk's plan
For some reason, record companies -- and some of their partners in the hardware and software industries -- keep trying to promote an outdated business model: the album.

In the land of cheese, tulips and biometrics
The Netherlands' innovative use of biometrics improves customer service and reduces fraud.

Protecting your .Net app from would-be plagiarizers
Developers using Java, .Net and the like find themselves contending with unscrupulous code cribbers, who lift everything but the comments from their hard word. A company called Xenocode has a means of fighting back.

Opinion: Getting to governance
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Jon Espenschied describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected.

Security goes to the movies: Iron Man
Time once again for "Security Goes to the Movies," a leisurely look at the inevitable bleeding from the eyes that security folk experience when Hollywood takes liberties with tech, the laws of physics and other aspects of reality. Our shiny and metallic subject today is Iron Man.

Campus Whispers
Universities need to be more proactive — and vocal — in dealing with their students' use of peer-to-peer file-sharing networks for illegal downloads.

Opinion: A spring cleaning for security
The column undertakes spring cleaning as the writer checks in on issues raised by "In Security" over the past year. He's got good news and bad news...

Torvalds: Microsoft is bluffing on patents
Linux kernel creator Linus Torvalds expressed doubt that interoperability advocates at Microsoft can triumph and ambivalence about Sun's recent overtures to the open-source movement in a recent interview with the Linux Foundation's Jim Zemlin.

The 7 most annoying developments in software
From product keys to click behavior, application developers need to stop annoying their users.

You can get lean and fast computing with your current version of Mac OS X. Here's how.
Some technology executives don't simply defy convention; they craft a whole new definition of leadership. Learn how the Premier 100 class of 2009 is blazing new management trails.
Apple's new display is more than a gorgeous 24-in. monitor; it's a de facto docking station.
We've got an array of economical, expensive, and just plain weird tech gifts for your friends and family.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Securing and Managing the Endpoints: The Case for Convergence
(Source: Symantec) To achieve best-in-class results, convergence of security, compliance and cost-effective management of endpoint systems is vital but not a means to an end. If your current levels of investment in security and compliance have gotten out of balance, taxing your IT resources and effectively your organizations ability to deliver new products and services, then you need to read this white paper.
More White Papers More White Papers
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"Privacy groups have long worried about Google's privacy policies --- and now it appears that consumers have followed suit. Google..." Read more Read More Blogs

"When all the terminals at this company suddenly stop responding, this pilot fish soon finds the problem's cause -- and..." Read more Read More Blogs

"The defunct McCain-Palin campaign is selling off the assets, and an investigative journalist from a FOX affiliate was able to..." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Virtualizing Microsoft Exchange
In September 2008, Computerworld invited IT and business leaders to participate in a survey on virtualizing Microsoft Exchange. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The goal of the survey was to understand initiatives surrounding virtualizing Microsoft Exchange. The survey was commissioned by NetApp, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Download now! 
Featured Column
The Spy FilesThe Spy Files
For Congress to do anything that helps protect consumers and the critical Internet infrastructure as a whole, it must pass laws that require proactive processes to protect computers, not that tell people how to deal with the resulting mess, says Ira Winkler.

Click here to read the latest column by Ira Winkler
Advances in SSL and Certificate Management
Advances in SSL and Certificate Management
View this webcast now!
Go to the webcast 
Learn-Fast Guide: Software as a Service is Growing Up
Download this Computerworld Executive Briefing, a $195 value, for free! Compliments of Akamai.
(Source: Computerworld) SaaS is here to stay as an application delivery channel. You will be using it, but will you do so wisely? This Learn-Fast Guide will prepare you for software delivered over the Web. From security issues to contract negotiations, there's a lot to consider ... and a lot to gain.
Download this executive briefing download
Creating a green data center to help reduce energy costs and gain a competitive advantage
Download this new white paper today!
(Source: VMware) With today's rapid IT growth, companies are looking to consolidate datacenter operations to achieve space and cost savings. And as energy costs continue to rise, datacenter efficiency becomes even more important. This IBM report details how companies are reducing energy usage and costs to gain a completive advantage.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
The Total Economic Impact of the Altiris Total Management Suite Software
Go Green with IBM System x Servers and Intel Xeon Processors
Creating a green data center to help reduce energy costs and gain a competitive advantage
View more whitepapers 
Featured Column
In SecurityIn Security
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Our columnist describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected.

Click here to read the latest column by Jon Espenschied
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events