- Welcome Guest
- Sign In
Microsoft's new monthly-patching policy is getting put to the test as several vulnerabilities, such as another Internet Explorer hole disclosed this week, present attackers with opportunity ...
With a goal of connecting all villages, schools, hospitals and governments by 2015 to put half the world's people within reach of information and communication technology (ICT), the U.N. opened the first-ever global summit on information in Geneva, Switzerland this week ...
A U.S. House of Representatives subcommittee confirmed this week the concerns of security experts and Washington insiders by grading most federal agencies with a D or F in terms of IT security ...
Concerns about computer viruses and worms are spreading beyond the PC arena as embedded software and systems vulnerable to attack are introducing risk to several unique technology sectors, including automatic teller machines (ATMs), emergency response systems and even automobiles ...
Although there is agreement that IT spending will increase in 2004, views vary on whether it will be marked by a return to more traditional buying patterns or significant structural changes forced by commodity pricing ...
Companies and developers hanging on to older releases of Microsoft software will no longer find downloads or support from the Redmond, Washington-based company as it complies with a nearly three-year-old settlement with Sun Microsystems over the use of Java ...
IBM claims it has found a way to apply nanotechnology -- a field of study in which researchers have manipulated materials at dimensions approaching the size of individual molecules -- to producing semiconductor components with existing chip-making tools ...
Despite a healthy boom for WiFi wireless products among home users, issues of security and complexity are still holding back the technology on the enterprise side, experts at a wireless conference said this week ...
U.S. Cyber Security Division director Amit Yoran, warmly embraced by the IT security community as head of the nation's cyber security when appointed in September, warned this week that more sophisticated and potentially disruptive cyber attacks could be looming against a system that remains vulnerable ...
The Recording Industry Association of America pushed forward with its campaign to sue illegal music file-traders this week, piling on another 41 suits in the third wave of legal action aimed at those who share music files over peer-to-peer (P2P) networks ...
An international anticensorship group is calling on the biggest names in technology, including U.S. heavyweights Cisco, Microsoft, Intel, IBM and Sun Microsystems, to stand against the "repression of the Internet" by China's government. Despite commercial gains in what analysts describe as one of the most significant markets in the world -- the country contains an exploding market of nearly 50 million Internet users -- China remains an oppressive overseer of Internet use within its borders.
Boasting half a billion dollars of technology innovation and no fewer than 20 new products, Sun Microsystems has released new software, systems and pricing aimed at leveraging its new relationship with chipmaker Advanced Micro Devices. As part of the strategy, Sun plans to move into the small-business market by promoting Java as a programming language and a platform...
A Norwegian court is again hearing the case of prominent cracker Jon Johansen, known as "DVD Jon" for his 1999 software program that circumvents DVD copy protection, the publication of which launched a swarm of lawsuits against Web publishers, including hacker site 2600.com ...
Despite holding the threat of legal action over college students and ISPs involved in publishing information about flaws in its electronic voting systems, Diebold has now retracted its threats and is looking to settle a suit brought against the company by those it threatened ...
Software pirates in Malaysia are reportedly selling an illegal version of Microsoft's next-generation Windows desktop operating system, codenamed Longhorn, which is not scheduled for official release for another two years at least ...
Wind River, one of the world's top embedded systems suppliers, has joined two key Linux proponent groups and solidified its intention to coexist rather than compete with the open-source operating system ...
The disclosure of a handful of critical security holes reported in Microsoft's Internet Explorer Web browser is conjuring up an old debate about the process of reporting security vulnerabilities as well as the usual concern over hacker attacks and compromised computers ...
IDC's Worldwide Quarterly Server Tracker indicated growth for nearly all classes of the network computers, with a whopping $10.8 billion in overall revenue representing 2 percent growth in the third quarter of 2003 ...
IBM hopes to hit it big with its new Business Integration Game (BIG) technology, which is a software system designed to throw third-party e-commerce and communication into the latest online role-playing and multiplayer video games ...
Intel has revealed plans to extend the number of transistors the company can put on chips with existing equipment. The next-generation technique includes a 65-nanometer process that the company said will help develop more capable processors and larger, more cost-effective 300-nanometer wafers, which are used for processors and other semiconductor manufacturing products...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/03/computer-programmer.jpg
https://www.linuxinsider.com/story/upgrade-to-ubuntu-pro-for-5-years-of-free-extended-support-177388.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/06/backup.jpg
https://www.linuxinsider.com/story/essential-tips-for-reliable-linux-backups-177398.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide