As if you couldn't figure this out on your own, the vast majority of consumers are ignorant about how to keep their computers secure. A study funded by America Online and the National Cyber Security Alliance sent technicians to 329 homes to inspect computers, and discovered, for example, that nearly 90 percent of the users had no inkling that their systems were plagued by spyware.
Between the Lines
Larry Dignan and other IT industry experts, blogging at the intersection of business and technology, deliver daily news and analysis on vital enterprise trends.
Larry Dignan is Editor in Chief of ZDNet and SmartPlanet as well as Editorial Director of ZDNet's sister site TechRepublic.
Andrew Nusca is a former writer-editor for ZDNet and contributor to CNET. During his tenure, he was the editor of SmartPlanet, ZDNet's sister site about innovation.
Rachel King is a staff writer for ZDNet based in San Francisco.
Gartner released part two of its interview with Harvard Professor Clayton Christensen on the topic of disruptive innovation (part one was released last month). In this installment, Christensen offers more strategic insight that companies can use to protect themselves from disruptive competitors.
Editor's note: A reader alerted me to the fact that the application discussed below is a Shockwave applet, not a Java application.
Microsoft CEO Steve Ballmer says a $100 PC is needed to stem piracy and make computing and the Internet accessible to populations in emerging countries...
You better feel good about what comes up when your name is dropped in a search box because chances are someone close to you has taken a look . According to a survey conducted by Harris Interactive, one in four adult Internet users has searched a colleague or a business contact online.
Microsoft has an edge in Denmark. Its enterprise resource planning software has a commanding share of the midmarket as well as a thriving collection of partners.
IBM has announced...
Jurgens Pieterse, an enterprise design strategist, has a background in business process engineering, IT investment planning, and enterprise architecture. A recent posting in his new blog on IT Toolbox.
The build vs. buy software debate of the '90s is back with the...
Just because your Social Security Number might not be one of the 1.4 million SSNs that were put at risk when an unknown intruder slipped through a security hole in a social researcher's unsecured computer at UC Berkeley doesn't mean the break-in is something you shouldn't be paying attention to.