In order to sell Longhorn when it launches, Microsoft has been trying to convince everyone of the importance of rich clients. Microsoft will lose its lock on the operating system if the only thing that people run on them are browsers.
CBS Interactive's Distinguished Lecturer David Gewirtz hosts ZDNet Government -- ZDNet's politics and policy coffeehouse -- where civics lessons meet technology, nothing is sacred, and everything is fair game.
David Gewirtz, Distinguished Lecturer at CBS Interactive, is an author, U.S. policy advisor, and computer scientist. He is featured in the History Channel special The President's Book of Secrets and is a member of the National Press Club.
Declan McCullagh has a detailed piece on the Real ID legislation that just passed the US House. The legislation would effectively force the States to meet certain requirements if they expect their driver's licenses to be used as IDs for federal purposes--like getting on an airplane.
You've no doubt been the target of phishing scams--those e-mails that claim there's some kind of problem with one of your accounts somewhere. When you click through to a legitimate-looking Web site, you're asked for personal information that can then be used by the phishers for various nefarious purposes.
As someone who'd been involved in Utah's high tech industry for a dozen years, I watched the founding and growth of Ray Noorda's Canopy Group with some interest and excitement. Before there were many VCs in Utah, Canopy was there, funding start-ups.
Augmented reality systems essentially bring the special effects ofmovies into more practical uses. Maybe one of the simplest examples are thesystems that let you see what your house will look like with the paintscheme you've picked out.
An article at TechTree reportsthat according to IDC's Worldwide Handheld QView, shipments ofhandheld devices fell nearly 20 percent year-over-year in thefourth quarter of 2004 to 2.8 million units.
Today, one of my students presented a paper in my graduate middleware class entitled Defense Enabling Using Advanced Middleware: An Example (PDF). The paper talks about various strategies for defending applications (rather than systems) from attack.
People are still talking about the recent news that the FBI's Virtual Case File system won't work after almost $170 million has been spent on it. A Wired News story has generalized the commentary to talk about government IT blunders.
Over the past five years, many CIOs have put significant effort intodeploying customer relationship management (CRM) systems. These systemsprovide a single view of the customer for the sales organization and givereal IT support to activities that were previously handled inspreadsheets, address books, and e-mail.