Monthly Archives: December 2004
Vonage Adds Video to VOIP Service
Buoyed by a recent FCC (Federal Communications Commission) ruling that its services are exempt from state and local regulation and tariffs, VOIP upstart Vonage...
Laptop Use Can Damage Male Fertility
Researchers at a New York university believe theyve found evidence that laptop use of notebook computers by men can impair fertility.
Researchers at the State...
Microsoft Looks to Broaden Tablet PC Appeal with Games
Microsoft Corp. is readying a Tablet PC game software development kit and a new Tablet-PC-specific game, both meant to attract new developers and users...
How Smart Enterprises Utilize Business Intelligence
Companies often find themselves drowning in data—unsure of who their customers are and what their buying patterns look like, ineffectively tracking stock, or not...
The Future of Wireless? Advertising, Of Course!
Linksys asked me to talk about "the future of wireless" for its annual sales convention. I ended up talking about advertising.
Actually, its a mystery...
Spyware: The Next Real Threat
NEW YORK—Spyware will replace the mass-mailing worm as the biggest nuisance—and security threat—facing businesses in 2005.
Thats the chilling assessment from Roger Thompson, director of...
At Last, a Guidebook for Choosing Electronic Health Records
Although electronic health records promise to reduce medical errors and boost personalized care, their cost, inconvenience and uncertain benefits are keeping physicians away. Even...
Best Buy Improves Its Supply Chain View
Best Buy Co. Inc., the leading consumer electronics chain in the United States, has launched a phased deployment of supply chain management/logistics software from...
HP Plans 10 Gigabit Ethernet One-Stop Shop
Hewlett-Packard Co. made strides this week in its plan to provide a complete 10 Gigabit Ethernet solution to customers.On Monday, HP announced that it...
Pop-up Loophole Opens Browsers to Phishing Attacks
Security firm Secunia has warned that most Web browsers are vulnerable to a simple "phishing" technique that could make fraudulent content appear genuine.The Copenhagen,...