Monthly Archives: February 2008
Google Begins Testing Video Ads
Google, which built its empire with text-based ads in paid links, this week is beginning to test video ads on its Web site, part...
Stripping Away Malware’s Armor
Getting around the defense mechanisms that malware writers erect isn't easy. From packers to run-time obfuscators, software-armoring techniques create problems for reverse engineers and...
Security Risks Very Real in Virtual Worlds
Virtual worlds can have some very real security concerns-something security researchers Charles Miller and Dino Dai Zovi showed Feb. 16 at the ShmooCon 4...
The (6-Week Long) End of Typing
My recent review of Microsoft's Response Point awakened in me an interest in speech recognition technology. Microsoft's product utilized speech recognition to help users...
Recruiters Dogpile on Ex-Yahoos
The struggling Yahoo laid off 1,000 workers this week. Gone are its vice president of marketing, senior manager of integrated campaign strategy and vice...
Comcast Denies Net Neut Violations
Network management techniques for handling peer-to-peer applications don't violate the Federal Communications Commision's network neutrality principles, Comcast said this week in its first extended...
Microsoft Sees Yahoo’s Mobile Potential as ‘Undervalued Gem’
It's no secret one of the traits that makes Yahoo so attractive to Microsoft are its mobile assets, but it's hard to quantify such...
What’s Behind the SCO Buyout
If I had a $100 million lying around, I really think I could find a better investment for my money than buying SCO. I...
Forecasting the Slow Movers
JDA Software Group is set to roll out this quarter a new forecasting algorithm that will address slow and erratic items for its E3...
Android Makes Like I, Robot
When Google unveiled Android last Nov. 5 the company positioned the open-source mobile operating system as a complete stack: operating system, middleware, user-friendly interface...