Monthly Archives: February 2008

Google Begins Testing Video Ads

0
Google, which built its empire with text-based ads in paid links, this week is beginning to test video ads on its Web site, part...

Stripping Away Malware’s Armor

0
Getting around the defense mechanisms that malware writers erect isn't easy. From packers to run-time obfuscators, software-armoring techniques create problems for reverse engineers and...

Security Risks Very Real in Virtual Worlds

0
Virtual worlds can have some very real security concerns-something security researchers Charles Miller and Dino Dai Zovi showed Feb. 16 at the ShmooCon 4...

The (6-Week Long) End of Typing

0
My recent review of Microsoft's Response Point awakened in me an interest in speech recognition technology. Microsoft's product utilized speech recognition to help users...

Recruiters Dogpile on Ex-Yahoos

0
The struggling Yahoo laid off 1,000 workers this week. Gone are its vice president of marketing, senior manager of integrated campaign strategy and vice...

Comcast Denies Net Neut Violations

0
Network management techniques for handling peer-to-peer applications don't violate the Federal Communications Commision's network neutrality principles, Comcast said this week in its first extended...

Microsoft Sees Yahoo’s Mobile Potential as ‘Undervalued Gem’

0
It's no secret one of the traits that makes Yahoo so attractive to Microsoft are its mobile assets, but it's hard to quantify such...

What’s Behind the SCO Buyout

0
If I had a $100 million lying around, I really think I could find a better investment for my money than buying SCO. I...

Forecasting the Slow Movers

0
JDA Software Group is set to roll out this quarter a new forecasting algorithm that will address slow and erratic items for its E3...

Android Makes Like I, Robot

0
When Google unveiled Android last Nov. 5 the company positioned the open-source mobile operating system as a complete stack: operating system, middleware, user-friendly interface...