- Welcome Guest
- Sign In
Malware creators are taking advantage of the controversy over the upcoming Olympic Games to spread their wares for illicit financial gain. Latching onto the Free Tibet political demonstrations that have spread around the world, would-be thieves have embedded a piece of rootkit malware that logs keystrokes in an executable Flash movie file called "RaceForTibet."
In a year of consolidation in a hot business intelligence (BI) marketplace, IBM, Microsoft, Oracle and SAP secured leading positions in 2007. This has cleared the way for a new generation of BI specialists to emerge and take root ...
Providing timely, reassuring and comprehensive customer service has been an axiom of good business for as long as people have been doing business ...
The potential to increase server utilization is the primary reason virtualization has been gaining traction in the enterprise. Cost reductions -- through greater data center efficiency, flexibility, lower energy usage and space needs -- are others ...
Retailers in Japan and South Korea have been using image capture technology for several years now, and with the growing base of smartphones, companies in the U.S. are rolling out a wide range of new mobile applications, including some that use interactive digital symbols captured in photos to provide customers with product information, prices and incentives on the spot...
As our reliance on smartphones continues to grow, so does the fear of losing all the information they contain -- and for good reason. Fierce competition among handset manufacturers and carriers has resulted in a chaotic, seemingly impenetrable jungle of incompatible makes and models with backup and recovery functionality that often proves complicated to use...
The word "footprint" has gained a lot of currency of late, particularly when talking about carbon consumption and emissions, but also within the IT world. Seen in its original and primary form, a footprint contains lots of information about the identity and nature of the beast that made it ...
Part 1 of this series looked at advances in nanotechnology and the threats it presents ...
Part 1 of this series looks at the need for, and benefits of, collaborative CRM applications in government. This final installment focuses on implementation ...
There's probably no field of applied scientific research with applications as diverse and implications as profound as nanotechnology. Advances are coming fast and the research environment is heady as billions of dollars each year go into nanotech research and development ...
Perhaps nowhere as in government services is the need for truly collaborative software and information systems so great. The organizational and information management challenges are as immense and far-reaching as government itself, and if anything have intensified in the face of budget cuts and constraints, population growth, demographic shifts and a more complex, technologically dependent and affluent society...
Perhaps like no other industry before it, the IT industry has come to thrive on continuous innovation coupled with rapid and widespread product introduction. In the competitive -- at times mad -- rush to be first or early to market key things are sometimes overlooked. When it comes to security, it is impossible to identify every vulnerability, much less foretell just how hackers will try to exploit them...
As the number of identity theft victims continues to mount, so has the amount of data and information related to such events -- and the time and resources devoted to better understanding, analyzing and devising measures that can better prevent such occurrences, as is seen in Part 1 of this series ...
Private, personally identifying information is everywhere, from portable computers and digital devices, to the Internet and private networks. This data can be obtained so easily -- either through technology or more mundane means -- and its theft is so often glamorized on film, that it is starting to attract a younger generation to criminal ranks ...
Recruiting and what has more broadly come to be known as "human capital management" is an area rife with IT activity, as was seen in Part 1 of this series ...
Software as a Service (SaaS), service-oriented architecture (SOA) and Web 2.0 technology are fundamentally changing the way people and organizations work, enabling greater degrees of collaboration and restructuring everything from business and operational processes to the way software is licensed and priced, according to recently released research from Forrester Research...
2007 turned out to be "one of the most remarkable years in the history of malware," according to the recently released "ESET Global Threat Report 2007." ...
It's long been a management axiom that the knowledge and abilities of employees are among the -- if not the -- most valuable of an organization's resources. While this is generally held to be true -- even in capital-intensive industries -- it is particularly valid for knowledge-intensive businesses ...
Peer-to-peer consumer lending sites are shaking up the world of Internet finance. Be it the Internet or broadband wide-area networks, growing capabilities and increasing standardization are changing the way finance organizations do business, as Part 1 of this series discusses ...
Part 1 of this series looks into the issue of PC recycling and following the course of a hypothetical laptop through the recycling process. Continuing down this path, this part will consider another situation: Laptop owner Joe Verdi doesn't own a laptop from a brand name OEM with a take-back program ...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide