Monthly Archives: January 2010
How Mobile Apps Threaten Search for Google, Yahoo, Microsoft
News Analysis: There are several opportunities to make money from pairing ads with search engines on smartphones and other mobile computing gadgets, but applications...
ATT Tells FCC It Wants to Ditch Land-Line Services
AT&T has told the Federal Communications Commission that in order to meet Congress' goal of extending broadband access to 100 percent of Americans, it...
Apple Predictions for 2010: iPhone on Multiple Carriers, iSlate, Beatles
In contrast to many tech companies dampened down by the recession, Apple experienced rising revenue and profits throughout 2009, buoyed by strong sales of...
Researcher Uncovers Twitter, Google Calendar Security Vulnerabilities
A security researcher has uncovered vulnerabilities in Twitter and Google Calendar that could put users at risk.In a proof of concept, researcher Nir Goldshlager...
Google Nexus One Buzz Busted by Harsh Reality Check
ABC News has published this doomsday piece by Michael S. Malone, who notes that while Google's Nexus One device is getting a lot of...
Tech Dinosaurs of Years Past
Today's top products might end up in tomorrow's scrap heap.Read my full review at eweek.com.
Another Look at Wine for Running Windows Apps
Given enough ISV support, Wine needn't be be a poor cross-platform solution for running Windows apps on Linux.Read my full review at eweek.com.
PCs Litter the Path to VDI
The option to use virtual desktops is becoming more feasible, but stiff hardware requirements, steep licensing costs and cloud alternatives should give IT managers...
REVIEW: VMware View 4’s New Transport Protocol Increases Usefulness, Performance of VDI Platform
VMware View 4 uses a specialized transport protocol to squeeze out lag time and significantly increase the number of monitors supported by the virtual...
REVIEW: Jitterbit 3.0 Effectively Links Disparate Apps, Data Sources
Jitterbit is a data integration suite that organizations can use to link up disparate applications and data sources that may not be capable of...