(Go: >> BACK << -|- >> HOME <<)

Industry


Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 

Featured Blogs

Seth H. Weintraub's picture

The Pirate Bay is (surprise!) guilty of pirating, but what about Google?

A Swedish court today found the Pirate Bay guilty of copyright infringement, otherwise known as pirating (surprise!). With all the news lately of pirates capturing ships off the Somali coast, it's easy to forget that online pirates are out there as well. But are other search players like Google going to get wrapped up in this?

...Read more

Robert L. Mitchell's picture

Saving with VoIP: The Vonage option

The cable companies seem to be taking over the telephone business these days with their "triple play" bundles, but they're not the cheapest option. Could an independent like Vonage be a better alternative?

...Read more

Jeff Boles's picture
Jeff Boles

Virtual Frontiers

The Cloud - staking out the infrastructure paradigm

In part 1 of this post I talked about emerging cloud technologies, and how one management technology built for the cloud paradigm is at play in bringing cloud-like capabilities to your infrastructure. Pressing on with this theme, one more example helps paint the picture of what cloud really is, and why much of the baggage we get mired in (the hoopla about standardization) should be tossed out with the bathwater.

...Read more

Lisa Hoover's picture
Lisa Hoover

The Evolving Web

Oprah in 140 characters

While everyone has been wringing their hands about the increasing number of spammers on Twitter, a small group of upstarts quietly began assembling while our heads were turned. It began with Shaq and Jon Mayer, then Britney and Miley popped up. Before anyone could stop it Ashton Kutcher was challenging Larry King to a digital duel and soon all of Hollywood was getting involved. Things have come to a head today, ladies and gentlemen. Oprah is in the house.

...Read more

Preston Gralla's picture
Preston Gralla

Seeing Through Windows

Researchers: Macs are less secure than Windows PCs

For years, Apple fans have claimed that Macs are invulnerable to attack, while belittling Windows as being full of security holes. Now the tables are turned --- not only has a Trojan infected Macs and created a botnet, but several well-known researchers warn that Mac OS X is less secure than either Windows or Linux.

...Read more

David Ramel's picture
David Ramel

RamelCast

FAQ/Videos: Pirate Bay, file sharing and BitTorrent – what’s it all about?

A look at today's Swedish court verdict against the four men hosting the notorious file-sharing/torrent-search site PirateBay.org, and one of the men's defiant responses via videos.

...Read more

IBM, GlobalFoundries plan more advanced chips

In today's podcast: IBM, GlobalFoundries plan more advanced chips; Sun still open to merger talks with IBM; and Google sees 6 percent increase in Q1 revenue.

...Read more

Eric Lundquist's picture

Shhh, IBM forms big new business intelligence consulting arm

IBM unleashes 4k consultants in the Business Intelligence market

...Read more

Sharky's picture
Sharky

Shark Tank

Not quite the result they were planning

This pilot fish has some extra money in his medical flexible spending account at the end of the year, and he knows it's use-it-or-lose-it time, so he decides to try Lasik surgery.

...Read more

IT Blogwatch's picture
IT Blogwatch

A Daily Digest of IT Blogs from Richi Jennings

Mac malware builds botnet, while smug fanbois gently weep

Apple logoIn Friday's IT Blogwatch, Richi Jennings watches a Mac OS X Trojan construct a botnet for distributed denial of service attacks and sending spam. Not to mention Drop7...

...Read more

Mark Everett Hall's picture
Mark Everett Hall

Sanity as a Service

Lessons from Twitter: Build a social network the right way

Twitter, Facebook and other high-traffic social network sites have all suffered embarrassing performance problems. But there are ways to build such sites better.

...Read more

Michael Horowitz's picture
Michael Horowitz

Defensive Computing

Different approaches to removing malware

There are four approaches to dealing with malware-infested Windows machines, and too many articles on the subject only consider the worst one. Here is a run-down on the pros/cons of each approach.

...Read more

Steven J. Vaughan-Nichols's picture

The five best, new things in Ubuntu Linux 9.04

The release candidate of Ubuntu Linux's latest version, Jaunty Jackalope, Ubuntu 9.04 is almost out and it's looking like a good one. Here are the five best things you'll have to look forward to in this release.

...Read more

Mike Elgan's picture
Mike Elgan

The World Is My Office

The Twitter growth numbers tell us nothing

The March Twitter numbers are in: Traffic more than doubled. At least that's what's being reported. Unfortunately, the figure is almost meaningless.

Let's be very clear on the facts. A company called comScore reported today that the number of "unique US visitors" to Twitter.com grew 131 percent during the month of March.

...Read more

Douglas Schweitzer's picture
Douglas Schweitzer

The Security Sector

National Security is influenced by Social Media

More than ever before, we live in an information-generated society. Gone are the days when most folks had to hear “news” not only hours, but even days after events unfolded. Today, we’re privy to up-to-the minute updates that often use live feeds. That said, not everyone in government participates in that type of data exchange. I’m not sure if it’s a generation gap or just a desire to retain the status quo.

...Read more