Search

Results 1541-1560 of 1817 for Jack M. Germain.

Open Source for Business: Now More Than Ever, Part 1

Business-targeted open source software has made great strides recently, from CRM systems to business intelligence to server software. Open source software resides at all levels of the business software stack, from servers to middleware to the front end. It powers Web services, databases and mobile d...

Web 2.0 Is Security Soft Spot for Enterprises, Report Says

While many sectors of the business community are accepting Web 2.0 usage with open arms, enterprise IT departments are not prepared to deal with the consequences posed by related threats, according to recent research. IT professionals also largely lack risk awareness, user training and consistent po...

EXCLUSIVE INTERVIEW

SpiralFrog CIO Jim Campbell: No Need for Piracy

SpiralFrog.com, a free music download site that launched on Sept. 17, allows registered users to download more than 800,000 songs and videos. As long as downloaders keep renewing their free monthly site registration, they can continue to play the song and video files on their PC. Users can also copy...

Media Player Exploits: New Vectors, New Threats

Two separate exploits involving the Apple QuickTime and the Microsoft Windows Media players could continue to plague computer users regardless of which Web browser is installed as the default on a computer system. So far, the only browser developer to announce a patch for this vulnerability is Mozil...

EXCLUSIVE INTERVIEW

FireEye CEO Ashar Aziz: Battling the Zombie Hordes

Computer security company FireEye announced on Monday a new strategy for fighting the worsening threat to consumers and businesses posed by botnets. The company announced its new Botwall appliance, linked to a worldwide intelligence network coupled to local botnet analysis designed to thwart attacks...

Great Linux Sites for Developers

What's a poor, lonely Linux developer to do? Where are all the good support sites? How am I going to fix that troublesome bug? These are questions that even novice code writers no longer have to ask. The classic view of a lonely, isolated programmer writing code for some obscure open source project ...

Online Billing, Part 2: Problems and Possibilities

While bill payers and many businesses have been slow to adopt cyber billing, consumers are much more accepting of paying their monthly bills electronically. Still, consumers often face a struggle with merchants who don't make e-payments a priority or the process of paying online easy to set up. Acce...

KHTML vs. Gecko vs. Trident vs. Presto: Behind the Browser

When a Web surfer clicks on an icon to launch his or her favorite Web browser, only the geekiest of the geeky pay any thought to which engine layout is at work. The typical Web user has no clue that a different browser choice may also include a different browser layout engine. If anything, most Inte...

Lenovo Thinks Small With New Energy Efficient Desktop Line

Lenovo introduced on Wednesday its newest energy-efficient desktop line with the ThinkCentre A61e, an ultra small form factor PC that combines a small footprint the size of a telephone book with 45-watt AMD Athlon 64 X2 and Sempron energy efficient processors. The ThinkCentre A61e takes up 25 percen...

Online Billing, Part 1: Leaving the Paper Trail Behind

Weeks before hearing that Apple had cut the price of its iPhone, the gadget's first buyers were met with a different surprise: an AT&T phone bill that in some cases was almost the size of a Stephen King novel. The wireless carrier meticulously detailed every connection and every data exchange. S...

Open Source Programmers, Developers to Hold First Power Powwow

Power.Org will sponsor the first Power Architecture Developer Conference in the Austin Convention Center September 24-25. The vendor-neutral convention will gather Power.org's corporate members with developers, hardware and software solution providers, academics and designers to show how open collab...

EXCLUSIVE INTERVIEW

iPerceptions VP Duff Anderson: Marketing the Voice of the Customer

Duff Anderson, vice president of research, development and knowledge delivery at iPerceptions, is a pioneer in the attitudinal Web analytics field, endeavoring since 1996 to forge standards for online research methodologies and analysis. iPerceptions, with offices in New York, Montreal and Toronto, ...

Predicting Insider Data Breaches

A ticking time bomb of sorts is hidden away in the cubicles and workstations of many businesses. When it goes off, the personal financial information of customers and workers could be laid bare. So can sensitive corporate data. The potential for both accidental and deliberate breaches of personal in...

Hack-a-Thon II to Put Distributed Coding Skills to Test

Terra Soft Solutions, the developer of Yellow Dog Linux and the HPC Consortium, will hold Hack-a-Thon II in Austin, Texas, Sept. 22-25, two days prior to the start of its four-day Power Architecture Developer Conference. Hack-a-Thon participants will work on a six-node PlayStation3 cluster to test t...

What’s New in Open Source Search?

Yahoo, Google and MSN hold a huge lead in search engine technology over open source alternatives. These search giants are competing in a battle among themselves to be a computer user's default search site for search. Where can a computer user go to find an adequate open source alternative to mainstr...

EXCLUSIVE INTERVIEW

Xandros CEO Andreas Typaldos: Getting Along With Redmond

Linux platform provider Xandros has taken one step further in a collaboration agreement with Microsoft that it signed in June over how the two firms will handle intellectual property on Linux interoperability projects. The two firms expanded the collaboration agreement on Aug. 15 to include Scalix e...

The State of the Desktop

The laptop computer has been gaining on traditional desktop PCs for some time. Replacing one's desktop completely with a portable computer that has enough power to handle any common task is now a feasible option for consumers, and more are heading that direction. Laptops are siphoning off sales of d...

Zero-Day Browser Exploits, Part 2: The Continuing Debate

The debate rages over whether open source browsers such as Firefox and Konqueror provide better zero-day attack protection than proprietary browsers such as Microsoft's Internet Explorer and Opera Software's Opera browser. Security experts line up on both sides of the discussion, often advising that...

PRODUCT PROFILE

Open Source Security, Part 2: 10 Great Apps

Open source security products do not generally carry the same following as their business suite and operating system brethren. However, the same reasons for supporting open source products in general also apply to open source security applications. Open source security applications are free, or at l...

The Woes of WiFi, Part 2: Digital Defense

WiFi has became pervasive. Not just laptops, but an arsenal of palmed-sized devices including smartphones, PDAs and mobile media players, now connect to the Internet using Wireless Fidelity technology. However, many users are clueless about security and connect to password-protected accounts and fin...

LinuxInsider Channels