Search

Results 1541-1560 of 1809 for Jack M. Germain.

Lenovo Thinks Small With New Energy Efficient Desktop Line

Lenovo introduced on Wednesday its newest energy-efficient desktop line with the ThinkCentre A61e, an ultra small form factor PC that combines a small footprint the size of a telephone book with 45-watt AMD Athlon 64 X2 and Sempron energy efficient processors. The ThinkCentre A61e takes up 25 percen...

Online Billing, Part 1: Leaving the Paper Trail Behind

Weeks before hearing that Apple had cut the price of its iPhone, the gadget's first buyers were met with a different surprise: an AT&T phone bill that in some cases was almost the size of a Stephen King novel. The wireless carrier meticulously detailed every connection and every data exchange. S...

Open Source Programmers, Developers to Hold First Power Powwow

Power.Org will sponsor the first Power Architecture Developer Conference in the Austin Convention Center September 24-25. The vendor-neutral convention will gather Power.org's corporate members with developers, hardware and software solution providers, academics and designers to show how open collab...

EXCLUSIVE INTERVIEW

iPerceptions VP Duff Anderson: Marketing the Voice of the Customer

Duff Anderson, vice president of research, development and knowledge delivery at iPerceptions, is a pioneer in the attitudinal Web analytics field, endeavoring since 1996 to forge standards for online research methodologies and analysis. iPerceptions, with offices in New York, Montreal and Toronto, ...

Predicting Insider Data Breaches

A ticking time bomb of sorts is hidden away in the cubicles and workstations of many businesses. When it goes off, the personal financial information of customers and workers could be laid bare. So can sensitive corporate data. The potential for both accidental and deliberate breaches of personal in...

Hack-a-Thon II to Put Distributed Coding Skills to Test

Terra Soft Solutions, the developer of Yellow Dog Linux and the HPC Consortium, will hold Hack-a-Thon II in Austin, Texas, Sept. 22-25, two days prior to the start of its four-day Power Architecture Developer Conference. Hack-a-Thon participants will work on a six-node PlayStation3 cluster to test t...

What’s New in Open Source Search?

Yahoo, Google and MSN hold a huge lead in search engine technology over open source alternatives. These search giants are competing in a battle among themselves to be a computer user's default search site for search. Where can a computer user go to find an adequate open source alternative to mainstr...

EXCLUSIVE INTERVIEW

Xandros CEO Andreas Typaldos: Getting Along With Redmond

Linux platform provider Xandros has taken one step further in a collaboration agreement with Microsoft that it signed in June over how the two firms will handle intellectual property on Linux interoperability projects. The two firms expanded the collaboration agreement on Aug. 15 to include Scalix e...

The State of the Desktop

The laptop computer has been gaining on traditional desktop PCs for some time. Replacing one's desktop completely with a portable computer that has enough power to handle any common task is now a feasible option for consumers, and more are heading that direction. Laptops are siphoning off sales of d...

Zero-Day Browser Exploits, Part 2: The Continuing Debate

The debate rages over whether open source browsers such as Firefox and Konqueror provide better zero-day attack protection than proprietary browsers such as Microsoft's Internet Explorer and Opera Software's Opera browser. Security experts line up on both sides of the discussion, often advising that...

PRODUCT PROFILE

Open Source Security, Part 2: 10 Great Apps

Open source security products do not generally carry the same following as their business suite and operating system brethren. However, the same reasons for supporting open source products in general also apply to open source security applications. Open source security applications are free, or at l...

The Woes of WiFi, Part 2: Digital Defense

WiFi has became pervasive. Not just laptops, but an arsenal of palmed-sized devices including smartphones, PDAs and mobile media players, now connect to the Internet using Wireless Fidelity technology. However, many users are clueless about security and connect to password-protected accounts and fin...

Open Source Security, Part 1: Securing Credibility

Open source applications have come into their own. For some time, open source programmers held much the same reputation as shareware authors. They were little more than experimenters and programming geeks who chose the alternate code-writing route because they could not or did not want to compete in...

EXCLUSIVE INTERVIEW

Galdos CEO Ron Lake: Mapping the Future of the Browser

The face of the Internet is rapidly changing. For instance, Web maps are no longer about finding your house online. A few years ago, map-making power remained in the hands of specialists. Today, map-making power is within everyone's grasp. In the past two years, Web giants like Google, Microsoft and...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 2: Strategies and Services

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. This new dependency on messaging has created a whole new spectrum of major risks, vulnerabilities and requirements for companies of all sizes. "Postini customers t...

Zero-Day Browser Exploits, Part 1: Is Open Source Safer Than IE?

Are open source browsers such as Firefox and Konqueror more secure than Microsoft Internet Explorer 7.0 and proprietary browsers like Opera? That is an age-old question, security experts say, with no clear-cut answer. Essentially, both browser types are free, making traditional budget-based purchase...

Nokia Siemens Networks Rings Up Carrier-Grade Linux Initiatives

Nokia Siemens Networks has joined the Linux Foundation and will become active in efforts to develop Carrier Grade Linux 5.0 standards. Nokia Siemens Networks will work with the Linux Foundation specifically on Linux-based technologies for use in user plane and control plane network elements, as well...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 1: The Challenges of Compliance

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. Today, with more than 170 billion e-mails and 580 billion IMs exchanged daily, companies have seen a 334 percent annual increase in bandwidth, processing and stora...

The Woes of WiFi, Part 1: Insecure by Default

WiFi is not just for laptops anymore. All sorts of devices now connect to the Internet via Wireless Fidelity technology. Smartphones -- think Apple's iPhone, among others -- mobile media players and even gaming machines often come with WiFi features to enhance usability. At the same time, more and m...

So You Want to Be a Linux Developer, Part 2

The continuing rise in popularity of Linux applications has become a boon to job opportunities for software programmers. However, the working culture of the open source industry is different from that of proprietary software developers. Code writers looking for a job as Linux developers need a uniqu...

LinuxInsider Channels