Monthly Archives: March 2007
A View of CeBIT from Above
Few remember, but before blogs, reporters would head off to a trade show and at some point file a notebook story of related show...
Cisco Online Help in a Slew of Products Could Open Systems to Attack
Cisco's online help system could allow cross-site scripting and a subsequent system takeover due to a vulnerability in several products, the company reported on...
U.S. Developers, Students Face Ever-Increasing Global Competition
As the software development trend continues to grow more rapidly outside the United States—in parts of Asia, Eastern Europe and other parts of the...
Exec Confirms Google Phone
A Google exec has confirmed that Google is developing a mobile phone but is downplaying the phone's significance."Some of the time the engineers are...
Symantec Voices Security Concerns over Vistas Use of Tunneling Protocol
Security company Symantec says new research supports fears that Windows Vistas use of the IP tunneling protocol Teredo is potentially insecure.
Microsoft is using Teredo...
Study: Businesses Unprepared for Aging Work force
Despite reports that the United States is facing a shortage of millions of workers within the coming decade as baby boomers retire, The National...
The Top 100: How We Ranked Them
So, here you have it. The 2007 list of the Top 100 Most Influential People in IT.The leaders on the list represent the great...
How to Stop the Dilbertization of IT
Talk to someone who has worked in IT for decades and more often than not, theyll regale you with stories of the "good old...
Focus on Forensics
There are bugs, malware and evildoers out there trying to take over your systems and steal your vital corporate data. Its your job to...
Top 100 Most Influential People in IT
Slide Show, Part 4: Check out the list—numbers 25-1.Slide Show, Part 3: Numbers 50-26 .Slide Show, Part 2: Numbers 75-51.Slide Show, Part 1: Numbers...