I’m at Digital ID World 2005 conference in San Francisco. Phil Becker, editor in chief of Digital ID World and host of the event, kicked off the event defining his notion of digital identity, with a capital "I.
New generation of software focuses as much on security as on glitzy features, as consumers get frustrated by viruses and fraud threats.
The downloadable software speeds the delivery of Web pages but has its critics. What is it, and how does it work?
CNET Labs has a review of the latest version for Windows of Skype's namesake voice over IP product. It scored an 8 out of 10.
A choice of Java desktop software will encourage a greater level of adoption. That has to be good for us all
Just about any task involving multiple operating systems on a single computer can be accomplished using VMware Workstation 5, which adds valuable new features and also delivers performance enhancements.
Mobile apps do not spring out of thin air. It takes a mobile application developer to build, test and refine mobile applications until they're ready to be launched. If your organization is seeking to hire...
Over the recent year, there's been a lot of talk about the so-called $100 PC. Last fall, during Gartner's Symposium in Orlando, Microsoft CEO Steve Ballmer talked about why "we" need a $100 PC.
Telewest says action is "heavy-handed" but they can't say they didn't see it coming...
Just under half of the UK's online population now bank online, but there will always be a place for the high-street branch, according to latest research
There's a marvelous (probably apocryphal) story about a database vendor who was giving a sales pitch to a prospective customer's applications people, all of whom were assiduously taking notes on their PCs. The audience asked questions that got steadily more technical and abstruse until the sales reps found themselves (to their surprise and dismay) ineptly discussing the relative merits of static versus temporary tables.
This morning, the Cyber Security Industry Alliance (CSIA) released a briefing that strongly presents the case for research and development activities to improve VoIP security.The briefing lists several reasons why VoIP is insecure, as well as the meta-consequences of this insecurity.
Internet service providers BigPond and iiNet have denied receiving e-mails from a software piracy watchdog warning of illegal activities by their users, although Optus and People Telecom say otherwise.The Business Software Alliance said it sent almost 3,400 messages to ISPs in Australia this year on top of 10,617 notices in 2004.
The pursuit of faster CPUs has AMD and Intel back at the core.
Their trial goes to the heart of the software industry...
Telstra's ADSL authentication systems developed a fault over the weekend and caused connection problems for hundreds of Internet service providers (ISPs) in NSW for around 12 hours.Australia's largest ISP Telstra, which provides broadband Internet access to both retail and wholesale customers, has admitted that the company's authentication systems went down for a number of hours over the weekend.
Increasing demand for broadband by consumers and businesses will propel the Multi-Tenant Unit/Multi-Dwelling Unit (MTU/MDU) in-building broadband equipment market to grow more than four-fold over the next several years, reports In-Stat. MTU/MDU in-building broadband equipment revenues are projected to grow from $364 million in 2004 to nearly $1.
According to BIGresearch and Artafact LLC, RFID awareness is much higher among men (52%) than women (31%). RFID aware men and women understand the technology and can accurately describe it to others.
In past blog posts regarding the difficulties inherent in crossing programming domains (Unix to Windows, say), some claimed that programming is universal, and any decent programmer should be able to cross development boundaries as easily as crossing the street. If they can't then they are stupid and should be fired (someone did claim that).