Calling it thin client does not do it justice, call it uber-client.
Between the Lines
Larry Dignan and other IT industry experts, blogging at the intersection of business and technology, deliver daily news and analysis on vital enterprise trends.
Larry Dignan is Editor in Chief of ZDNet and SmartPlanet as well as Editorial Director of ZDNet's sister site TechRepublic.
Rachel King is a staff writer for ZDNet based in San Francisco.
Zack Whittaker writes for ZDNet, CNET, and CBS News. He is based in New York City.
The Windows vs. Linux debate comes down to three factors: Expertise, expertise, expertise. Sooner or later, someone will displace Microsoft.
The real race between Microsoft and Google may boil down to which can truly change itself best and fastest.
At a hearing yesterday in room 437 of the venerable State House in Boston, Mass., a Commonwealth Senate oversight committee chaired by Senator Marc R.
Sorry for the delay. The Wi-Fi cut out during the event, which wasn’t good for blogging or the product demos.
Gates showed off two new cloud-based part of its overall architecture: Windows Live and Office Live.
A decade or so ago, I was excited about Java. The promise of Java as a language was that it would make applets, servlets, and other Internet programming tasks easier.
In opening the event today, Bill Gates said that every five years Microsoft looks at its strategy and makes big bets--1990 was Windows, the Web in 1995 and Web Services .Net in 2000.
Responding to Ross Mayfield's post on Microsoft's challenges in pivoting into services world inhabited by Google and others (Microsoft's announcements on the subject coming later this morning), Microsoft alpha blogger Robert Scoble offers 12 reasons--such as start up costs, performance per dollar, no lock in, more scalable, more security, easier to customize--why Web 2.0 entrepreneurs say that they don't want to work with Microsoft software.
Reports are beginning to turn up around the Web that discuss how certain CDs from Sony Music come with a Trojan horse-based digital restrictions management (DRM) technology that surreptitiously installs itself as a rootkit on Windows PCs. When software surreptitiously installs a rootkit, it's usually doing so to cover its tracks -- a technique commonly associated with malware such as viruses and Trojan horses.