Search Results

Results 3121-3140 of 3169 for Richard Adhikari

Google Plays Openness Card to Slip Broadband Between TV Channels

Having induced the Federal Communications Commission to open up the C block of wireless airwaves at the recent wireless auction, Google is now seeking access to another set of airwaves in pursuit of openness ...

Database Engine Flaw Makes Word Attachments Dangerous

Don't open that Word file attached to your e-mail; it might contain malware ...

Virtual Appliances: A Safety Zone in the Virtual Environment

As corporations increasingly virtualize their environments, they are finding that traditional physical security and network applications are not adequate for their needs ...

After the Auction, the Real Wireless Wrangling Begins

The wireless spectrum auction is over and the big boys have won the day -- America's two biggest carriers, Verizon Wireless and AT&T, shelled out a total of more than US$16 billion for tons of spectrum ...

Microsoft Fashionably Late to Virtualization Party

Battling furiously to catch up to market leader VMware in the hypervisor market, Microsoft has unveiled what it calls a "feature-complete" version of its Hyper-V product ...

Android, Schmandroid: Linux on the iPhone

Since its launch, renegade developers have been working to make the iPhone a Linux workstation, porting tools to the device. And why not? It has enough RAM and hard disk space to make the work worthwhile ...

Intel, Microsoft: The Future of Computing Is Parallel

Laying the groundwork for their continued business health, Intel and Microsoft have coughed up US$20 million to fund research into desktop and mobile parallel computing for consumers and businesses ...

The Virtualization Challenge, Part 5: Virtualization and Security

Part 1 of this five-part series defines virtualization; Part 2 takes a look at the business drivers for virtualization; and Part 3 examines the challenges enterprises face when they virtualize their IT environment. Part 4 covers implementing and maintaining a virtualized system. This final installment focuses on security in the virtualized environment...

Intel Maps Out Course to Eight-Core Nehalem

Intel this week laid out its lineup of new products, which take dead aim at some of the latest hot buttons in computing ...

China Blacks Out YouTube After Tibetan Riot Videos Appear

As Tibetans -- led by Buddhist monks -- rioted in the capital city of Lhasa, burning Chinese-owned businesses and attacking Chinese, Beijing clamped down on YouTube and other media outlets depicting the violence ...

Sweden Aims to Shed Status as Haven for Pirates

Sweden, long the home of Internet pirates, may not be a safe haven for them any more. The Swedish government is working on legislation that will force Internet service providers (ISPs) to disclose IP (Internet protocol) addresses used for illegal file-sharing to the legal owners of those rights ...

Acer Enters Blue Period With Stylish High-End Notebook

Just 10 months after launching its Gemstone line in May 2007, Acer has introduced refinements to that line's design, unveiling two new notebooks in the Aspire Gemstone Blue line, the 6950 and the 8950 ...

YouTube Gives Developers Video Takeout Option

YouTube has opened up its application programming interfaces (APIs) to the world. This will let developers build what amounts to their own mini-YouTubes on their Web sites, blogs or Wikis ...

The Virtualization Challenge, Part 4: Implementing the Environment

In Part 1 of this five-part series, we define virtualization; in Part 2, we look at the business drivers for virtualization; Part 3 looks at the challenges enterprises face when they virtualize their IT environment. This installment covers implementing and maintaining a virtualized system ...

AI Program Thinks Like a 4-Year-Old

Researchers at the Rensselaer Polytechnic Institute have created a reasoning virtual 4-year-old child ...

Online Behavior Tracking: No Such Thing as Enough

Every time you go online, you leave electronic footprints -- and someone is following them ...

Capturing the Elusive URL: There’s Gotta Be a Better Way

Everywhere you look today, you're hit right between the eyes with an URL. They pop up in TV ads, in ads on the big screen, on billboards, posters, soup cans, cereal boxes, on the sides of buses -- just about anywhere ...

Bridging the Linux Gap for Windows Admins

Xandros, which makes intuitive Linux solutions and tools to manage mixed environments, announced two new products that will make it easier for Windows systems administrators to manage Linux platforms in their IT environment ...

Cops Raid 51 CeBIT Booths in Patent Crackdown

German police raided 51 booths of companies suspected of showing pirated products at electronics show CeBIT 2008, which runs through Sunday in Hannover, Germany ...

Microsoft Gives Web Devs New Tools in IE8 Beta

Microsoft has released Internet Explorer 8 beta 1, four months ahead of schedule. The browser is aimed at developers, the software giant said, but anyone can download the beta from its sites. It was originally scheduled to be released in June ...

LinuxInsider Channels