Search

Results 1561-1580 of 1817 for Jack M. Germain.

Open Source Security, Part 1: Securing Credibility

Open source applications have come into their own. For some time, open source programmers held much the same reputation as shareware authors. They were little more than experimenters and programming geeks who chose the alternate code-writing route because they could not or did not want to compete in...

EXCLUSIVE INTERVIEW

Galdos CEO Ron Lake: Mapping the Future of the Browser

The face of the Internet is rapidly changing. For instance, Web maps are no longer about finding your house online. A few years ago, map-making power remained in the hands of specialists. Today, map-making power is within everyone's grasp. In the past two years, Web giants like Google, Microsoft and...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 2: Strategies and Services

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. This new dependency on messaging has created a whole new spectrum of major risks, vulnerabilities and requirements for companies of all sizes. "Postini customers t...

Zero-Day Browser Exploits, Part 1: Is Open Source Safer Than IE?

Are open source browsers such as Firefox and Konqueror more secure than Microsoft Internet Explorer 7.0 and proprietary browsers like Opera? That is an age-old question, security experts say, with no clear-cut answer. Essentially, both browser types are free, making traditional budget-based purchase...

Nokia Siemens Networks Rings Up Carrier-Grade Linux Initiatives

Nokia Siemens Networks has joined the Linux Foundation and will become active in efforts to develop Carrier Grade Linux 5.0 standards. Nokia Siemens Networks will work with the Linux Foundation specifically on Linux-based technologies for use in user plane and control plane network elements, as well...

EXCLUSIVE INTERVIEW

Postini CEO Quentin Gallivan, Part 1: The Challenges of Compliance

E-mail and other forms of electronic communications have become pervasive and essential to business growth and operational productivity. Today, with more than 170 billion e-mails and 580 billion IMs exchanged daily, companies have seen a 334 percent annual increase in bandwidth, processing and stora...

The Woes of WiFi, Part 1: Insecure by Default

WiFi is not just for laptops anymore. All sorts of devices now connect to the Internet via Wireless Fidelity technology. Smartphones -- think Apple's iPhone, among others -- mobile media players and even gaming machines often come with WiFi features to enhance usability. At the same time, more and m...

So You Want to Be a Linux Developer, Part 2

The continuing rise in popularity of Linux applications has become a boon to job opportunities for software programmers. However, the working culture of the open source industry is different from that of proprietary software developers. Code writers looking for a job as Linux developers need a uniqu...

Committee Grills LimeWire CEO Over P2P Security

A Congressional hearing on Tuesday investigating inadvertent file sharing over peer-to-peer networks unexpectedly put a spotlight on LimeWire Chairman Mark Gorton over the government and personal information that can be acquired over P2P networks without users' knowledge. Gorton's company makes the ...

So You Want to Be a Linux Developer, Part 1

Five years ago, the only engineering or computer science majors setting their sights on a career in writing software code for an open source company were the most hardcore of computer nerds. That was something done only by the true computer geeks, and it usually required an independent source of inc...

Intel’s Threading Building Blocks Goes Open Source

Intel announced Tuesday the release of Threading Building Blocks 2.0 as both an open source and commercial product. The company also launched a Web site that establishes an open source project around this product. Threading Building Blocks is a C++ runtime library that abstracts the low-level thread...

Meet the New Bad Guys: Hired Guns, Zero-Minutes and Malware 2.0

Other than perhaps the medical and legal industries, no field relies on jargon more than computer technology. Take, for instance, the use of words borrowed from other lexicons -- terms such as "virus, "Trojan," "intrusion prevention system," "spyware," and "attack vector." You might well hear these...

Spying in the Workplace: Big Money?

An offer made earlier this month to pay whistle blowers $1 million for reporting companies using unlicensed software has met little or no public outcry, unlike lawsuits initiated by the music industry against illegal music downloaders. The Business Software Alliance, a global organization representi...

Bringing Doctors and Lawyers Into the 21st Century

Legal and medical professionals are often criticized for being way behind the times in terms of the technologies they use in their offices. It seems as though any doctor's or lawyer's office you enter has reams of papers and mountains of file cabinets taking up space just waiting to be lost, stolen ...

EXCLUSIVE INTERVIEW

Openads CEO James Bilefield: Publishers Need Independent Solutions

London-based Openads, the developer of a free, open source adserver used by more than 20,000 publishers in 140 countries, announced on July 5 the appointment of James Bilefield as CEO. Bilefield brings more than 15 years of entrepreneurial, management and media experience to Openads from his work at...

Latest AV Weapons for Disarming Software Miscreants

In the early days of antivirus protection, all vendors used basically the same approach. Antivirus software scanned a computer's memory and all the files on the hard drive, and then compared them to a database of signatures that matched known malicious code. The only real difference among antivirus ...

Web Shoppers and Info Security: A Question of Credibility

Today's online shoppers may be more cautious than they were two years ago. Some are waiting up to 35 hours before completing a shopping cart transaction. A study of consumers' Internet buying habits suggests that online merchants face stiffer competition and new hurdles in closing sales over the Web...

Scan Spots Open Source Installations

Information security firm OpenLogic on Wednesday began letting users download its Discovery application, a free software tool that scans Windows, Linux and Solaris machines for all installed open source software. OpenLogic Discovery identifies more than 5,000 versions of the top 900 open source pack...

Zombie Nation

In the second half of last year, more than six million computers were taken over by infectious programs known as "botnets." The number represents an increase of 29 percent when compared with the first half of the year, according to security firm Symantec's latest Internet Security Threat Report. Unk...

Zend Releases Version 1.0 of Framework App

PHP developer Zend Technologies announced July 2 the release of version 1.0 of Zend Framework, an open source application framework for PHP. Zend Framework 1.0, pre-released in beta versions since last year, is the result of collaboration from 230 contributors comprised of individual developers and ...

LinuxInsider Channels