Search

Results 1441-1460 of 1807 for Jack M. Germain.
EXCLUSIVE INTERVIEW

Top Layer Networks’ Ken Pappas: When PCI Compliance Isn’t Enough

High-profile data breaches continue to spotlight the growing risks consumers face of identity theft and credit card fraud. Four highly visible data breaches disclosed in the last 18 months are particularly worrisome because they show a systemic failure in the procedures that both the public and regu...

The Storm Worm’s Elaborate Con Game

Despite their discovery of a direct link to the funding sources behind the infamous Storm Virus, IronPort Systems researchers are doubtful law enforcement will ever nail the perpetrators. Still, improving technologies may help to block its continuing spread. In its latest Security Trends Report, rel...

EXCLUSIVE INTERVIEW

Bhaskar Rao: Conquering Space and Time With MIMO

Bhaskar Rao is known for his discoveries in the realm of space exploration. However, he's never ventured beyond the atmosphere of Mother Earth. His space-related technology expertise lies in innovative advances in the world of signal processing. His explorations resulted in the emergence of MIMO, or...

STARTUP TO WATCH

OneBigPlanet.com: Adding Gravity to Loyalty Programs

When Eric Aubertin, founder and CEO of the e-commerce loyalty firm OneBigPlanet, sold his last company, eFundraising, to "Reader's Digest," he had time on his hands to shape the idea behind his next online innovation. He had a notion to develop a new type of consumer platform that would bring commun...

EXCLUSIVE INTERVIEW

IBM’s Steve Sams: Taking a Swipe at Data Center Energy Consumption

Steve Sams, IBM vice president for site and facilities services worldwide, is waging a war against energy-hogging data centers worldwide. He will carry his assault to the Computer Measurement Group's international conference later this year. CMG is a not-for-profit, worldwide organization of IT prof...

EXCLUSIVE INTERVIEW

Hunting Botnets With Randal Vaughn

You might call Randal Vaughn the Botnet Slayer. After all, he spends much of his time researching the intricacies of cybercrime carried out through malware marauders perpetrating their evil deeds with robotized computers around the globe. When Vaughn is not peering through sinuous Internet traffic r...

HP’s New Eco-Friendly Printer Push

HP kicked off a new effort Thursday to expand its green computing influence with the release of a series of products, tools, services and initiatives to help customers reduce their environmental impact when imaging and printing. The product releases target the differing needs of enterprise, small an...

Funambol Pounds Out New Mobile OSS Forge

Open source mobile messaging software developer Funambol has created a new open source software forge as a central collaboration site for mobile OSS developers around the world. The Web site pulls together some 50,000 global developers to a combination of wikis, blogs and forums in addition to discu...

Virtualization: Savings Are Not Guaranteed

Virtualization is one of the most significant hot-button topics in enterprise today. Linux server virtualization has allowed enterprises to leverage resources more efficiently. It also is giving CIOs and IT managers a tool to address growing corporate concerns over environmental issues and rising en...

SUCCESS STORY

Azul Systems: Jazzing Up Java

In early 2002, the founders of Azul Systems wagered that Java was going to become a prominent enterprise platform. If that happened, they suspected enterprise customers of Java would soon need relief from the pain points caused by poor scaling and disappointing deployment costs. Azul Systems CEO and...

STARTUP TO WATCH

QuestKeys: A Workaround for the Long URL Tangle

Daniel Allen sees a problem faced by Web surfers: How to share long URLs with others and quickly locate favorite Web pages or documents without wading through lists of browser bookmarks? Allen and his wife, Mary Jane, are both self-taught programmers, among other professions. Their answer to the abo...

The Art of Cyber Warfare, Part 2: Digital Defense

In Late April last year, about 1 million computers under botnet control started attacking the Estonian government's computers in a denial of service assault. The onslaught continued for three weeks. In the aftermath of this cyber warfare incident, NATO provided the Estonian government with some help...

The Art of Cyber Warfare, Part 1: The Digital Battlefield

New-age warfare is here. Governments and Internet security firms are quietly gearing up for the potential onslaught. Don't think that cyber warfare is merely fuel for novel writers. Cyber attacks are being waged in increasing numbers. Computer network attacks are often perpetrated by gangs of crimin...

VoIP: When Cheaper Could Mean Costlier

For enterprises, the primary reason for adopting Voice over Internet Protocol phone service is money. Long-distance phone calls placed over the Internet typically cost a mere fraction of those placed under the business rate plans offered by traditional telephone companies. As a result, the business ...

PRODUCT REVIEW

A Linux Server in the Palm of Your Hand

Japanese Linux computer firm Plat'Home released in March a palm-sized, full-featured Linux-based server dubbed "OpenBlockS." This tiny marvel is no lightweight wanna-be replacement to a real Linux server. It can run most server applications that you would expect to run on a "normal" full-sized Linux...

Hooked on Tech: How Much Is Too Much?

Having an interest in computers and the Internet is one thing, but can going overboard with it qualify you for a deviant behavior diagnosis from a clinical therapists? That may depend on how much time you sit at the keyboard and how much that impacts your job, your family and your other important in...

OpenLogic Kicks Off Open Source Head Count

OpenLogic, a provider of open source packages, kicked off the data-gathering second phase of a global project aiming to collect and share quantitative data on the use of open source software. The company on Wednesday announced an initial list of 10 survey sponsors and launched a census designed to s...

Mid-Sized Businesses and the Quest for Compliance

Mid-market companies often have few choices when it comes to ensuring compliance with federal regulatory edicts for customer identity and financial records. Big companies use business process management and enterprise resource planning systems to track everything their employees do. Mid-size compani...

Green Tech and Greenbacks: The Money Case for Eco-Friendly Computing

One interpretation of the term "green computing" focuses on the machine's energy consumption. The less power a computer needs, the less harm to the environment it does -- and the less the owner has to spend on energy costs. Are those energy savings enough of a reason to make major enterprise buying ...

CASE STUDY

The OSS Cure for What Ails Hospital IT

What does a systems engineer in charge of a computer network for a major medical facility do to trim expenses and administer much-needed performance medicine to mission-critical applications? In the case of Orlando's Florida Hospital, network administrators surgically removed failing proprietary sof...

LinuxInsider Channels