Monthly Archives: August 2009
Smarter Technology Virtual Conference Center Debuts
var sPath = window.location.pathname; var moviename = new Array();...
Cyber-attacks on Georgia Show Need for International Cooperation, Report States
When resentment against a pro-Georgian blogger boiled over into a distributed denial-of-service attack against social networking sites Aug. 6, it seemed to echo the...
Why Transmedia Launched Glide Engage on the T-Mobile G1 Instead of Apple’s iPhone
Transmedia CEO and Chairman Donald Leka isn't buying the recent talk about the Apple iPhone being superior to the T-Mobile G1 based on Google's...
How to Safeguard Databases Against Malicious Attacks
Database security, whether as a topic of discussion or a set of tools, has been around for several years now. It is only in...
Google Spruces Up Insights for Search with iGoogle Gadget, Embedded Tables
With all of the hullabaloo created over the weekend by Google Chief Economist Hal Varian's claim that scale is bogus, I found it interesting...
The Google Android Opportunity: Follow Apple’s iPhone
Did Google err by unleashing its mobile operating system to open source and letting hardware manufacturers and phone carriers decide what Android smartphones get...
IBM Using DNA to Build Next-Generation Chips
IBM Using DNA to Build Next-Generation Chips
by Jeffrey Burt
Binding
In this image, low concentrations of triangular DNA origami are binding to wide lines on a...
REVIEW: Now Is the Time to Evaluate Windows 7
With Windows 7 now released to manufacture and with licensing available for Software Assurance customers, the time is right for enterprise administrators to begin...
U.C. Professors Air Google Book Search Settlement Concerns
Is Google's support system crumbling for its Google Book Search settlement?Faculty members for the University of California, which publicly supported the deal when it...
Microsoft’s IE 8 Effective at Blocking Phishing, Malware, Report Says
Microsoft's Internet Explorer 8 Web browser is effective at blocking both phishing sites and socially engineered malware, according to two new NSS Labs reports....