Monthly Archives: June 2006
Training the Next Generation of IT Professionals
Its a Tuesday afternoon, and a group of 14 students have gathered in the back room of a computer lab at Columbia University in...
Cyber-criminals Use P2P Tools for Identity Theft, Security Analyst Warns
EAST PALO ALTO, Calif.—Cyber-criminals are multiplying quickly and becoming more sophisticated in the ways in which they take advantage of unwitting Internet individual users...
Expert Voices: Prudentials CIO on the Benefits of IT Mentors
For Barbara Koster, IT isnt only about alignment and meeting business goals.
The global CIO of Prudential Financial, a $37 billion financial services firm, feels...
Net Disaster Could Paralyze Economy, Study Warns
Americas Internet and cyber infrastructure have become such a critical backbone for the exchange of information, that any major disruption could have significant economic...
Twilight of Obliterati Part II: Sunrise for Good Developers
In my last column, I talked about how the inevitable end of the globalization fad would lead to a lot of confusion and failure...
Text Messaging Used as Malware Lure
Botnet herders have found a crafty new way to lure computer users to maliciously rigged Web sites—via text messaging on cell phones.
The latest social...
Could Google Get Digg-y Wit’ It?
Digg, the Web community that lets users vote on news items, today unveiled a site-wide redesign and expanded its coverage area beyond technology. The...
IBMs Stallings: Mainframes Opening New Markets
/zimages/4/139114.jpgWith the release in April of the z9 Business Class mainframe, IBM announced that it saw not only the midrange as a key market...
Linux Engine Drives Pixars Cars
Ever wonder how Lightning McQueen and friends looked so good in the movie Cars? A lot of that spit and polish came from Pixar...
Guess CIO Buries Weak Search Engine
Even CIOs at billion-dollar retailers have to put their jeans on one upgrade at a time. But Guess CIO Michael Relich found himself in...