Monthly Archives: January 2005
Is Mandatory Windows Validation a Security Risk?
Microsofts plans to clamp down on the way illegal copies of its flagship Windows operating system receive updates—including security patches—could have a major impact...
Analysts: Ellison Playing Hard Ball with Intellectual Property
Following SAP AGs pouncing on TomorrowNow Inc., a third-party maintenance provider for PeopleSoft applications, Oracle Corp. CEO Larry Ellison warned that such providers should...
A Linux Geek Embraces Mac OS X
Ive always wanted a Mac. There, I said it. Im out of my Mac closet. Ive secretly longed for one but could never really...
Antitrust Task Force to Examine Longhorn Next
Although a first Longhorn beta release is still a number of months off, its not too soon to begin considering whether the next version...
Avoiding Evil Twins and Rogue Access Points
A whole new class of attacks is emerging to threaten Wi-Fi users. "Evil Twin" and other Wi-Fi-oriented attacks can fool users into providing confidential...
EarthLink, SK Telecom Team for Cell-Phone Service
Internet service provider EarthLink Inc. has teamed up with Koreas largest wireless operator, SK Telecom, in a $440 million joint venture to offer new...
IBM Aims to Ease SOA Implementation
IBM has come up with a new service offering to help customers better connect their business goals with their technical resources.
Known as Service Oriented...
Apple Issues Security Fix for Mac OS X
Apple Computer Inc. has released a security update for Mac OS X that fixes seven vulnerabilities in the operating system and its applications, including...
Manufacturers to Adopt Supply Chain Apps, but Not RFID
Whats going to happen in manufacturing technology during 2005? Users will adopt new supply chain solutions in areas such as supplier relationship management. On...
Muni-Wireless: The Battle Continues
If you thought the debate over municipal broadband and its attendant Wi-Fi services ended with the passage of House Bill 30 in Pennsylvania late...