Search

Results 1-20 of 2144 for Richard Adhikari.

Novell Aims for the Clouds With Suse Enterprise 11

Taking aim at the next generation of computing -- virtualization and the cloud -- Novell on Tuesday unveiled Suse Linux Enterprise 11. Suse Linux Enterprise 11 has been optimized for the major hypervisors -- VMware ESX, Microsoft Hyper-V and Xen. It runs on the x86, Itanium, IBM Power and IBM System...

This Week’s Browser Fight: Will Security KO Speed?

Speed kills -- ask any cop -- and browser users are going to find that out very soon. The browser wars heated up this week, with Microsoft's launch of Internet Explorer 8, Google's release of a new beta version of Chrome, and the debut of Mozilla's Fennec, the mobile version of Firefox. One of th...

Microsoft Debuts IE8, Only to Have It Hacked

Microsoft's unveiling of Internet Explorer 8 on Thursday was marred by news that the browser, touted to be its most secure ever, already has been hacked. The launch has also kicked off a new round of browser wars, with Google unveiling a new beta of its Chrome browser, and Mozilla releasing Fennec, ...

HTC Promises at Least 3 More Android Phones in ’09

HTC was the first mobile device maker to introduce a smartphone for the Android platform. Now it might be the second, third and fourth as well. Peter Chou, CEO of the Taiwanese handset manufacturer HTC, told the Wall Street Journal that it will bring out at least three new Google Android smartphones...

Super-Fast Rechargeable Battery Slurps Up Power

Massachusetts Institute of Technology has electrifying news, if you'll pardon the pun -- engineers at the institute have come up with a way to speed up the charging and discharging of lithium-ion batteries. Lithium-ion, or Li-Ion, batteries are the ones you'll see in your laptop, cell phone and othe...

Symantec Bungle Unleashes Torrent of Spam, Confusion

Like cats and mice, security product vendors and cyber-criminals do not care much for each other. Over the past 24 hours, however, cyber-criminals may have just about fallen in love with Symantec, which made a mistake that let crooks launch a flood of malware on the Internet. It all began when Syman...

Data Centers and the Push to Power Down

The next five years or so will spell big trouble for data centers. About 46 percent of more than 150 IT professionals and executives surveyed earlier this year by the Business Performance Management Forum said they're running out of space, power and cooling infrastructure for their data centers. In ...

Yahoo Gives Itself a Social Makeover

Yahoo wants to tie all its various services together so each user needs to log in just once to access and manage its services, and will be able to do so from one central site. To do this, it is rewiring its architecture from the inside out and opening up its platform to third-party developers, Yahoo...

Ballmer: XP’s Demise Negotiable

Microsoft may reconsider its decision to pull Windows XP off the shelves in June if it sees enough customer demand, CEO Steve Ballmer said -- despite a huge customer outcry over the decision. Speaking at Louvain-La-Neuve University in Belgium, Ballmer also said it's a "statistical truth" that most p...

Microsoft, Novell Tag-Team Against Chinese Distros

As if stepping on the Linux community's toes when they first teamed up wasn't enough, Microsoft and Novell have announced a joint push into the China market to attack the Linux installed base there. They have launched what they call "an incremental investment in their relationship" that will focus o...

Student Journalist Twitters Himself Out of the Pen

When UC Berkeley journalism graduate student James Karl Buck was grabbed by police in the Egyptian industrial city of Mahalla El-Kobra while photographing a noisy demonstration, he sent a one-word text message to Twitter: "Arrested." That eventually got him out of jail. His Twitter followers -- frie...

Smarter Than Your Average Card

Think having a credit or debit card with your photo on it is cool? Well, how about a card the same size and thickness as a credit card, with a window that shows a passcode, and with a public key infrastructure chip on it? When you need to use the card, press on its switch and the PKI chip will run a...

A Burgeoning Bevy of Biometric Barriers

Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either. Often, passwords created by end users in corporations are simple, being based on numbers significant to them:...

Magnificent Seven Band Together for 4G Showdown

In a bid to avoid the bitter battles that have raged around third-generation wireless technology, owners of the patents on which the fourth-generation LTE wireless technology is built have agreed to charge each other "reasonable" license fees. The Magnificent Seven are Nokia, the world's largest han...

Securing Your Network, One Zone at a Time

As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other. This makes it difficult to implement an enterprise security solution. Adding virtualization to the mix complicates...

The Uneasy Future of Online Security

The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...

CONFERENCE REPORT

RSA Town Hall: It Takes a Village to Weather a Cyber Storm

How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...

CONFERENCE REPORT

Chertoff on Cybersecurity: ‘Reverse Manhattan Project’ Needed

After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...

PRODUCT PROFILE

Microsoft Releases Forefront Stirling to Beta

Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...

PRODUCT PROFILE

Archer Launches Exchange for Enterprise Apps

Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...

How does the quality of customer service delivered by government compare to that of the private sector?
Loading ... Loading ...

LinuxInsider Channels