Search

Results 1-20 of 2137 for Richard Adhikari.

Yahoo Gives Itself a Social Makeover

Yahoo wants to tie all its various services together so each user needs to log in just once to access and manage its services, and will be able to do so from one central site. To do this, it is rewiring its architecture from the inside out and opening up its platform to third-party developers, Yahoo...

Ballmer: XP’s Demise Negotiable

Microsoft may reconsider its decision to pull Windows XP off the shelves in June if it sees enough customer demand, CEO Steve Ballmer said -- despite a huge customer outcry over the decision. Speaking at Louvain-La-Neuve University in Belgium, Ballmer also said it's a "statistical truth" that most p...

Microsoft, Novell Tag-Team Against Chinese Distros

As if stepping on the Linux community's toes when they first teamed up wasn't enough, Microsoft and Novell have announced a joint push into the China market to attack the Linux installed base there. They have launched what they call "an incremental investment in their relationship" that will focus o...

Student Journalist Twitters Himself Out of the Pen

When UC Berkeley journalism graduate student James Karl Buck was grabbed by police in the Egyptian industrial city of Mahalla El-Kobra while photographing a noisy demonstration, he sent a one-word text message to Twitter: "Arrested." That eventually got him out of jail. His Twitter followers -- frie...

Smarter Than Your Average Card

Think having a credit or debit card with your photo on it is cool? Well, how about a card the same size and thickness as a credit card, with a window that shows a passcode, and with a public key infrastructure chip on it? When you need to use the card, press on its switch and the PKI chip will run a...

A Burgeoning Bevy of Biometric Barriers

Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either. Often, passwords created by end users in corporations are simple, being based on numbers significant to them:...

Magnificent Seven Band Together for 4G Showdown

In a bid to avoid the bitter battles that have raged around third-generation wireless technology, owners of the patents on which the fourth-generation LTE wireless technology is built have agreed to charge each other "reasonable" license fees. The Magnificent Seven are Nokia, the world's largest han...

Securing Your Network, One Zone at a Time

As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other. This makes it difficult to implement an enterprise security solution. Adding virtualization to the mix complicates...

The Uneasy Future of Online Security

The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...

CONFERENCE REPORT

RSA Town Hall: It Takes a Village to Weather a Cyber Storm

How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...

CONFERENCE REPORT

Chertoff on Cybersecurity: ‘Reverse Manhattan Project’ Needed

After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...

PRODUCT PROFILE

Microsoft Releases Forefront Stirling to Beta

Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...

PRODUCT PROFILE

Archer Launches Exchange for Enterprise Apps

Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...

CONFERENCE REPORT

Symantec CEO Calls for Federal Hacking Law

The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...

CONFERENCE ROUNDUP

Security Sleuths Search for a Single Sign-On Solution

Security vendors are working to create a single sign-on that would make it easy for users to log on to the Web and to different Web sites. Project Concordia -- formed last year by vendors offering electronic identity products to create a harmonized standard and ensure identity initiatives and protoc...

New Finjan Appliance Sniffs Web Traffic for Crimeware

Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...

TECH BLOG

Live From RSA: Getting Ready for the Security Smackdown

It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area...

SCO’s Plan to Rise From the Ashes Flickers Out

SCO, the company everyone in the Unix and Linux worlds loves to hate, has lost its latest angel investor. Private equity firm Steven Norris Capital Partners had filed a memorandum of understanding tentatively offering $5 million in stock and a $95 million loan the long-moribund SCO would use to pay ...

Android A-OK With AT&T, Says CEO

AT&T Mobility CEO Ralph de la Vega caused a stir at a press conference at CTIA Wireless 2008 in Las Vegas Wednesday when he expressed interest in Google's Android platform. Some reports even had him committing to shipping phones running Android later this year. Others, however, only had him saying t...

Intel Unleashes Powerful, Power-Saving Atom Chips

Intel on Wednesday unveiled the Centrino Atom family of low-power processors for mobile Internet devices. It also announced a new class of inexpensive, simple Internet-centric computers, called "netbooks," which will hit the market later this year, and new developments in other chip families. The ce...

Which most influences your decision to accept a LinkedIn invite from a stranger?
Loading ... Loading ...

LinuxInsider Channels