Search

Results 1361-1380 of 1709 for Jack M. Germain.
SUCCESS STORY

Azul Systems: Jazzing Up Java

In early 2002, the founders of Azul Systems wagered that Java was going to become a prominent enterprise platform. If that happened, they suspected enterprise customers of Java would soon need relief from the pain points caused by poor scaling and disappointing deployment costs. Azul Systems CEO and...

STARTUP TO WATCH

QuestKeys: A Workaround for the Long URL Tangle

Daniel Allen sees a problem faced by Web surfers: How to share long URLs with others and quickly locate favorite Web pages or documents without wading through lists of browser bookmarks? Allen and his wife, Mary Jane, are both self-taught programmers, among other professions. Their answer to the abo...

The Art of Cyber Warfare, Part 2: Digital Defense

In Late April last year, about 1 million computers under botnet control started attacking the Estonian government's computers in a denial of service assault. The onslaught continued for three weeks. In the aftermath of this cyber warfare incident, NATO provided the Estonian government with some help...

The Art of Cyber Warfare, Part 1: The Digital Battlefield

New-age warfare is here. Governments and Internet security firms are quietly gearing up for the potential onslaught. Don't think that cyber warfare is merely fuel for novel writers. Cyber attacks are being waged in increasing numbers. Computer network attacks are often perpetrated by gangs of crimin...

VoIP: When Cheaper Could Mean Costlier

For enterprises, the primary reason for adopting Voice over Internet Protocol phone service is money. Long-distance phone calls placed over the Internet typically cost a mere fraction of those placed under the business rate plans offered by traditional telephone companies. As a result, the business ...

PRODUCT REVIEW

A Linux Server in the Palm of Your Hand

Japanese Linux computer firm Plat'Home has released a palm-sized, full-featured Linux-based server dubbed "OpenBlockS." This tiny marvel is no lightweight wanna-be replacement for a real Linux server. It can run most server applications that you would expect to run on a "normal" full-sized Linux box...

Hooked on Tech: How Much Is Too Much?

Having an interest in computers and the Internet is one thing, but can going overboard with it qualify you for a deviant behavior diagnosis from a clinical therapists? That may depend on how much time you sit at the keyboard and how much that impacts your job, your family and your other important in...

OpenLogic Kicks Off Open Source Head Count

OpenLogic, a provider of open source packages, kicked off the data-gathering second phase of a global project aiming to collect and share quantitative data on the use of open source software. The company on Wednesday announced an initial list of 10 survey sponsors and launched a census designed to s...

Mid-Sized Businesses and the Quest for Compliance

Mid-market companies often have few choices when it comes to ensuring compliance with federal regulatory edicts for customer identity and financial records. Big companies use business process management and enterprise resource planning systems to track everything their employees do. Mid-size compani...

Green Tech and Greenbacks: The Money Case for Eco-Friendly Computing

One interpretation of the term "green computing" focuses on the machine's energy consumption. The less power a computer needs, the less harm to the environment it does -- and the less the owner has to spend on energy costs. Are those energy savings enough of a reason to make major enterprise buying ...

CASE STUDY

The OSS Cure for What Ails Hospital IT

What does a systems engineer in charge of a computer network for a major medical facility do to trim expenses and administer much-needed performance medicine to mission-critical applications? In the case of Orlando's Florida Hospital, network administrators surgically removed failing proprietary sof...

The Eco PC: Less Power In, Fewer Hazards Out

How green is your computer equipment? The answer could provide insight into how much electricity you aren't buying each month to run your computers and peripherals. It can also provide a clue to how much long-term harm your computing activity is having on the world around you. The question of green ...

HP Draws Up Plans for New Enterprise Printers and Programs

HP on Tuesday introduced a new line of imaging and printer services designed for the needs of the enterprise market. A major component of the company's new offerings is a business partner accreditation, certification and test program. Its latest products help enterprises manage, secure and simplify ...

Linux Foundation: Paid Contributors Helping to Grow Kernel

Over the last three years, the number of developers of the Linux kernel has tripled, according to the Linux Foundation. A research team from the organization has reported that the growth of the open source operating system into new areas is attracting more hands-on code writing of the Linux engine.

Cyber-Thieves’ New Target: Business Processes

The business use of e-mail worldwide has become so critical that the ever-increasing number of spam attacks containing malware are placing corporate and customer information at the highest levels of risk yet, according to an industry-wide survey Internet security firm Webroot conducted last month. W...

New Utility Enforces Policies Across Linux, Unix and Windows Networks

Symark International on Tuesday released PowerADvantage, an integrated authentication and configuration tool that extends features of Microsoft Windows' Active Directory to networks also running Unix and Linux systems. PowerAdvantage adds centralized authentication, authorization and account access ...

Application Acceleration: The Digital Drag Race

Computer technology in the workplace is all about hardware speed and connection bandwidth. To help IT managers augment their systems in both regards, vendors have been developing tweaking strategies to boost application speed beyond design limits. This process is called "application acceleration." H...

Teach a Man to Phish and He’ll Feed on Fools for a Lifetime

Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...

E-Mailers Beware: Phishers Never Sleep

Can you recall the five worst phishing scams to grace your e-mail in-box? Can you spot a genuine e-mail from your financial institution or government agency? Don't feel too technologically challenged if your answer is no to either -- or both -- of these questions. Even security experts are hard-pres...

WiFi Hotspot Surfers Beware: Sharks Patrol These Waters

WiFi features are as standard on today's portable computers as built-in modems used to be. Laptop users have become accustomed to the ability to connect to the Internet from practically anywhere to reach e-mail, Web sites and music download portals. Consumers even use wireless routers to connect to ...

LinuxInsider Channels