(Go: >> BACK << -|- >> HOME <<)


Ads by TechWords

See your link here
Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Networking
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
 
Email Marketing Software
iContact Email Marketing Software Simplifies Online Communication.
Online Survey Software
Vovici online survey software, sample surveys & survey templates.
Ecommerce Web Design
Maximize ROI with ECommerce Partners' Custom Shopping Cart
Internet Service
$100 Cash back with Online Orders. Plans starting as low as $19.95.

In nod to users, Facebook opens vote on terms of service
Facebook announced that its users can now vote to choose one of two governance options for the social networking site. Read more...

Are Oprah, Ashton Kutcher taking the geek out of Twitter?

The Pirate Bay four found guilty in Sweden

Google suffers several negative firsts in quarter

Appeals court blocks Internet streaming order in RIAA music piracy case

Google profit and revenue up in Q1

Twitter's U.S. users nearly double in March

Milestone: Over 50% of voters used Internet in 2008 election

Citrix details Web 2.0 'app delivery controller'

Mozilla ponders dropping Firefox support for Win2k, early XP

More Internet Applications StoriesMore Top Stories

Things You Didn't Know About Firefox Browser Tabs
Sure, you use Firefox, but are you really making the most of it? I mean, I know plenty of users who never bother to change the home page, even though they always go straight to another site upon starting the browser. (Just make that site your home page, people!)

Analyzing Twitter with Excel, Part 3
For the last two weeks I've been considering how to analyze Twitter messages using Excel 2003. Having been thwarted by the deficiencies of Excel and Twitter (turns out that Twitter Search returns malformed HTML and Excel won't tolerate that) I have a new plan: Let's use cURL to retrieve the raw XML returned by Twitter search and then haul that data into Excel for the analysis.

First look: Exchange 2010 beta shines
Exchange 2007 introduced unified messaging, a completely new management client and improvements to almost every aspect of the mail server, but at the cost of a whopping learning curve for administrators. Admins will have an easier go of it this time around.

Can IT manage the cloud? These CTOs can
Brian Corrigan used to run datacenters for major casinos, so he knows not to gamble with mission-critical apps. Now, he works in the other gaming industry -- the one with joysticks and lots of shooting -- building communities for online gamers and collecting information about game usage for their publishers. As CTO at Agora Games, he needs to quickly ramp up and then cut his computing capabilities as new games come on the market, become all the rage, and eventually fade into so-so status. So it's little surprise that he's joined the growing ranks of companies buying computing, storage, and networking power as they need it from the cloud.

Exchange 2010: Better administrator control
While Exchange 2007 introduced a plethora of reliability and scalability features, Exchange 2010 helps to clean up what was really a confusing set of options. E-mail managers looking for guidance on building distributed Exchange networks will be pleased to see what has been pushed into Exchange 2010. (We weren't able to test most of these features, so our analysis is based on using the management GUI and reading the reviewers' guide provided by Microsoft.)

Exchange 2010: Webmail features are solid
End-users accustomed to Web-based access to their personal e-mail through free Internet services such as Google's Gmail, expect the same power and access through a browser for their business e-mail. Exchange 2010 stands up very well to these high expectations.

Exchange 2010 beta sneak peek-test
The first public beta of Microsoft's next version of Exchange, due out in the second half of this year, hits the streets Wednesday. Microsoft gave us early access and we had 10 days to put it through its paces in a VMware environment.

UC security: When the shoe won't fit, compress the foot
If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in many different areas: the security paradigm looked good until a technology comes along, changes the assumptions and reveals the inadequacy of the model.

Ten Lessons Learned From Using E-mail Lists
Last week's column showed you three different choices that you can use to create and manage your own e-mail list server. This week I want to talk about the "softer" side of things: how to run your lists and choose what you write about, what you send out, how you send it out, and why you bother doing it.

Does Twitter really fit into business and IT?
There have probably been more words written about Twitter than there are Twitter users. While it is considered the newest, most popular form of social networking, fitting into the category of microblogging, it is in fact used by far fewer people than Facebook, for example.

Linux, Mac, Windows XP: Whatever your choice of operating system, we have some fun things for you to try.
The operating systems of yesteryear weren't all sunshine and roses. Cyber cynic Steven J. Vaughan-Nichols names his picks for some of the worst OSs of all time.
Apple's newest Mac Pro takes a significant step forward with the move to Intel's new Nehalem processor and an infrastructure that should be able to squeeze the utmost out of the upcoming Mac OS X 10.6.
Satellite radio will die soon anyway, but Apple will accidentally perform a mercy killing of Sirius XM Radio this summer, says Mike Elgan.
Get the latest news, reviews and more about Microsoft's newest desktop operating system.
Find wage data for 50 IT job titles.
Virtualize Servers with Microsoft Hyper-V and NetApp
(Source: NetApp) Learn how NetApp technologies help provide data protection, disaster recovery, deduplication, thin provisioning, and efficient cloning for faster virtual server provisioning when using Microsoft's Hyper-V virtualization solutions.
More White Papers More White Papers
Sign up now for complimentary access to these upcoming Computerworld webcasts.
E-mail Address:
(Required)
 Networking
 Networking Security
 Wireless Networking
 Networking Hardware & Devices
"While everyone has been wringing their hands about the increasing number of spammers on Twitter, a small group of upstarts..." Read more Read More Blogs

"A look at today's Swedish court verdict against the four men hosting the notorious file-sharing/torrent-search site PirateBay.org, and one of..." Read more Read More Blogs

"You can’t spend more than five minutes on the Internet these days without bumping into the term Software as a..." Read more Read More Blogs

"You can save big bucks on small items like cables. This month the best price for four items I bought..." Read more Read More Blogs

More E-Business & Web 2.0 Blogs More E-Business & Web 2.0 Blogs
See all Computerworld Blogs See all Computerworld Blogs
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events