Search Results

Results 41-60 of 200 for Andrew K. Burger

‘Free Tibet’ Message Masks Rootkit Malware

Malware creators are taking advantage of the controversy over the upcoming Olympic Games to spread their wares for illicit financial gain. Latching onto the Free Tibet political demonstrations that have spread around the world, would-be thieves have embedded a piece of rootkit malware that logs keystrokes in an executable Flash movie file called "RaceForTibet."

The BI Boom, Part 1: New Players

In a year of consolidation in a hot business intelligence (BI) marketplace, IBM, Microsoft, Oracle and SAP secured leading positions in 2007. This has cleared the way for a new generation of BI specialists to emerge and take root ...

The Burdensome Costs of Customer Justice

Providing timely, reassuring and comprehensive customer service has been an axiom of good business for as long as people have been doing business ...

Same Foot, Smaller Footprint With Virtualization

The potential to increase server utilization is the primary reason virtualization has been gaining traction in the enterprise. Cost reductions -- through greater data center efficiency, flexibility, lower energy usage and space needs -- are others ...

STARTUP TO WATCH

StoreXperience: A Mobile Bridge Between Bricks, Clicks

Retailers in Japan and South Korea have been using image capture technology for several years now, and with the growing base of smartphones, companies in the U.S. are rolling out a wide range of new mobile applications, including some that use interactive digital symbols captured in photos to provide customers with product information, prices and incentives on the spot...

Answering Smartphone Users’ Calls for Backup

As our reliance on smartphones continues to grow, so does the fear of losing all the information they contain -- and for good reason. Fierce competition among handset manufacturers and carriers has resulted in a chaotic, seemingly impenetrable jungle of incompatible makes and models with backup and recovery functionality that often proves complicated to use...

How Big Should Your IT Footprint Be?

The word "footprint" has gained a lot of currency of late, particularly when talking about carbon consumption and emissions, but also within the IT world. Seen in its original and primary form, a footprint contains lots of information about the identity and nature of the beast that made it ...

The Perils of Nanotech, Part 2: Reining In Runaway Research

Part 1 of this series looked at advances in nanotechnology and the threats it presents ...

Collaboration in Government IT, Part 2: Putting It in Place

Part 1 of this series looks at the need for, and benefits of, collaborative CRM applications in government. This final installment focuses on implementation ...

The Perils of Nanotech, Part 1: Dancing in the Dark

There's probably no field of applied scientific research with applications as diverse and implications as profound as nanotechnology. Advances are coming fast and the research environment is heady as billions of dollars each year go into nanotech research and development ...

Collaboration in Government IT, Part 1: Needs and Benefits

Perhaps nowhere as in government services is the need for truly collaborative software and information systems so great. The organizational and information management challenges are as immense and far-reaching as government itself, and if anything have intensified in the face of budget cuts and constraints, population growth, demographic shifts and a more complex, technologically dependent and affluent society...

New Security Suite Blocks Data Diversion

Perhaps like no other industry before it, the IT industry has come to thrive on continuous innovation coupled with rapid and widespread product introduction. In the competitive -- at times mad -- rush to be first or early to market key things are sometimes overlooked. When it comes to security, it is impossible to identify every vulnerability, much less foretell just how hackers will try to exploit them...

The Cost of ID Theft, Part 2: Fixing the System

As the number of identity theft victims continues to mount, so has the amount of data and information related to such events -- and the time and resources devoted to better understanding, analyzing and devising measures that can better prevent such occurrences, as is seen in Part 1 of this series ...

The Cost of ID Theft, Part 1: Beyond Dollars and Cents

Private, personally identifying information is everywhere, from portable computers and digital devices, to the Internet and private networks. This data can be obtained so easily -- either through technology or more mundane means -- and its theft is so often glamorized on film, that it is starting to attract a younger generation to criminal ranks ...

Enterprise Recruiting, Part 2: Adding Web 2.0 Spice

Recruiting and what has more broadly come to be known as "human capital management" is an area rife with IT activity, as was seen in Part 1 of this series ...

A Future Without Software Maintenance Fees

Software as a Service (SaaS), service-oriented architecture (SOA) and Web 2.0 technology are fundamentally changing the way people and organizations work, enabling greater degrees of collaboration and restructuring everything from business and operational processes to the way software is licensed and priced, according to recently released research from Forrester Research...

Malware Purveyors Had Banner Year in ’07

2007 turned out to be "one of the most remarkable years in the history of malware," according to the recently released "ESET Global Threat Report 2007." ...

Enterprise Recruiting, Part 1: Powering Up the Process

It's long been a management axiom that the knowledge and abilities of employees are among the -- if not the -- most valuable of an organization's resources. While this is generally held to be true -- even in capital-intensive industries -- it is particularly valid for knowledge-intensive businesses ...

Taking Internet Finance to the Next Level, Part 2: A Case Study

Peer-to-peer consumer lending sites are shaking up the world of Internet finance. Be it the Internet or broadband wide-area networks, growing capabilities and increasing standardization are changing the way finance organizations do business, as Part 1 of this series discusses ...

A Recycled Laptop’s Journey, Part 2: Doing the Job Right

Part 1 of this series looks into the issue of PC recycling and following the course of a hypothetical laptop through the recycling process. Continuing down this path, this part will consider another situation: Laptop owner Joe Verdi doesn't own a laptop from a brand name OEM with a take-back program ...

LinuxInsider Channels