Search

Results 181-200 of 207 for Paul Korzeniowski.
SPECIAL REPORT

Camera Phones Making Corporations Photo-Sensitive

Since wireless phones have become so inexpensive and easy to use, their use is rapidly rising in corporations. While the phones can deliver alluring productivity benefits, they also can present a new security risk: Corporate assets, such as new products, manufacturing floor layouts, and business pla...

TECHNOLOGY SPECIAL REPORT

Mobile Gaming: The Latest Wireless Cash Cow

Wireless carriers are finding online gaming via use of cell phones to be the latest cash cow to boost revenues. "Carriers have been surprised that wireless gaming is even more lucrative than ringtones," Ken Hyers, a senior analyst with market research firm In-Stat/MDR, told TechNewsWorld. Online gam...

Music Downloads Shift into High Gear

At the moment, the truism that "imitation is the sincerest form of flattery" can easily be applied to Apple's iTunes online music store and those services that are attempting to compete with it. In April 2003, Apple launched the iTunes service and quickly sold millions of songs. As a result, compani...

TECHNOLOGY SPECIAL REPORT

Closing Up Wireless Security Holes

Because they offer users network-access flexibility as they move from place to place, wireless LANs -- often called WLANs -- have gained significant acceptance. While the technology has proven to be a boon to maintenance technicians, salespersons and programmers, it has been a sometimes vexing secur...

TECHNOLOGY SPECIAL REPORT

Mobile Phone OS Battle Heats Up

Cell phones are no longer used simply for voice communications; increasingly, they support text messaging, e-mail, Web surfing and even video transmissions. With this transformation has come the need for a more sophisticated mobile operating system. Half a dozen vendors, including Microsoft and Symb...

TECHNOLOGY SPECIAL REPORT

Consumer Alert: Identity Theft on the Rise

Crime is turning from a blue-collar to a white-collar profession. Rather than taking out guns and robbing convenience stores, criminals are performing "virtual robberies" where they use computer technology to steal a person's identity. From a criminal perspective, these crimes are simple to commit, ...

TECHNOLOGY SPECIAL REPORT

Internet Cars: Making Drive-Time Productive

Driving is a time-consuming activity for many: Salespersons spend hours journeying from customer site to customer site; maintenance technicians weave through traffic as they go from office to office; and families spend time traveling to soccer games, relatives' homes and school activities. Ideally, ...

SPECIAL REPORT

Fine-Tuning Spam Filtering

Because the volume of spam has increased from about 10 percent of all e-mail in 2001 to more than 50 percent today, corporations and ISPs have been trying to find ways to keep the junk mail from overwhelming users' inboxes. Filtering products, which rely on several techniques to separate needed mess...

TECHNOLOGY SPECIAL REPORT

Twilight of Barcodes and the Dawn of RFID

Barcodes, those familiar sets of lines on items from DVDs to refrigerators, eventually may go the way of the typewriter, the black-and-white television and the dodo. Radio Frequency Identification technology promises to replace bar coding and make it easier for suppliers, distributors and retailers ...

TECHNOLOGY SPECIAL REPORT

Instant Messaging Opens New Security Holes

Instant messaging has become the latest employee productivity tool. A customer-service representative can use it to answer a customer inquiry, whereas a salesperson can inform a busy vice president about a new account. In fact, research firm Gartner estimates 70 percent of corporate employees rely o...

TECHNOLOGY SPECIAL REPORT

3G Networks Ready To Take Hold

Faster, more flexible, less expensive and more functional has been the telecommunications industry's mantra. As soon as one networking technology takes hold, vendors begin pushing another that promises to deliver more functionality, and such a scenario is now unfolding with wireless wide area networ...

TECHNOLOGY SPECIAL REPORT

Passwords Fail the Security Test

Passwords are the first line of defense in almost every company's security scheme. But sometimes they are the weakest link because they can be easily guessed, stolen or otherwise compromised. If a firm wants to keep its information secure, then it needs to put additional security checks in place. Pa...

Online Shopping and the Future of Comparison Buying

The volume of goods being purchased via the Internet is rising. However, while certain consumers know what they want and feel comfortable making an instant purchase, many have questions about product pricing, availability and quality. Increasingly, the latter group is turning to online comparison-sh...

CONSUMER REPORT

Camera Phones and the Future of Digital Photography

The mall's latest fashion trend is not carried at Liz Claiborne, Tommy Hilfiger or J. Crew. Instead, young adults are flocking into Best Buy and Circuit City for the latest accessory: camera phones. The product's low price and convenience have sparked a sales boom: Market research firm In-Stat/MDR, ...

INDUSTRY REPORT

Search Engines Prepare for New Battles

When the Internet first emerged into the mainstream, companies like Yahoo evolved rapidly from startups into successful corporations by helping users sift though mountains of information to find the data they needed. But as the Internet grew, many of those companies shifted their attention away from...

SPECIAL REPORT

Can Lessons from the Common Cold Help Us Defeat Computer Viruses?

Through the years, some malicious computer programs have come to be known as viruses. Dr. Fred Cohen, a principal analyst with market research firm Burton Group, coined the term when he was working as a graduate student at the University of Southern California in the early 1980s. "There was a resemb...

INDUSTRY REPORT

WiFi Standards Compete for Market Dominance

A general rule for IT departments is no matter how much bandwidth a network offers, users want more. So as soon as the Institute of Electrical and Electronics Engineers completed work on the 802.11b specification, which supports 11 Mbps wireless LAN transmissions, the 802.11 working group began to w...

BEST OF ECT NEWS

The Future of P2P File-Sharing Networks

The debate about whether peer-to-peer applications, which were first made popular with the Napster file-sharing network, should be legitimate or illegitimate continues to rage. On one side are applications like Morpheus and Kazaa, whose makers claim their products have many uses. On the other side a...

INDUSTRY REPORT

The Most Destructive Viruses of All Time

Hackers and security vendors are engaged in a never-ending game of leapfrog, with the former constantly devising clever viruses and the latter feverishly trying to concoct antidotes. As a result, through the years hundreds of thousands of malignant programs have infected networks around the world. M...

VoIP’s Guerilla Effort To Supplant Traditional Telcos

Rather than move for an all-out frontal assault, voice over IP (VoIP) service providers are flanking the traditional telecommunications companies. In building their businesses, the VoIP providers -- which develop products that let customers make telephone calls over the Internet -- are not trying to...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels