HomeLatest News

Latest News

There’s No Shill for Microsoft Bing on Google Watch

On Aug. 10 I posted a piece on eWEEK in which I explored the one scenario I could think of that would enable Microsoft...

Vizioncore, Iland to Provide Trans-Atlantic Replication Service

You read it here first: Vizioncore, a respected virtualization and data management provider, is teaming with Iland Internet Solutions to deliver new cloud-based disaster...

Early Release Won’t Help Apple’s Snow Leopard Win Corporate Converts

Reports are swirling, claiming Snow Leopard, Apple's follow-up to its current operating system, Leopard, will be hitting store shelves much sooner than originally expected....

Microsoft Patent Lawsuit Could Spell Trouble for Open-Source Format

The court ruling that Microsoft violated an XML-related patent held by i4i, a small Canadian company, could threaten not only Redmond, but also the...

Google Must Fight Lawsuits to Win On2’s Hand in Marriage

Shareholders for On2 Technologies have filed suit to block Google's $106.5 million bid to buy the video compression software maker because they are unhappy...

Google Reader Now Lets You Launch Content to Twitter, Facebook, Digg

Google Reader is turning into quite the launching pad for helping users share content. Now the service lets users post content to Twitter, Facebook,...

Palm Reacts to Pre Privacy Complaints

Palm has responded to complaints from mobile application developer and Palm Pre smartphone owner Joey Hess, who claimed on his personal blog to have...

Google Caffeine Pulled for Data Center Maintenance

Google's Caffeine, the developer sandbox for the company's next-generation search infrastructure, is down until later this afternoon. The reason? Upgrades.Search Engine Land's Matt McGee...

Qt Software Changes Name to Qt Development Frameworks

Nokia has announced a change in both its Qt Software unit's name and Web address.As of Aug. 11, Qt Software will be known as...

Attack Variants Living Shorter Shelf-Lives

As attackers seek to endlessly vary their threats in order to circumvent reactive security controls and find their way onto more end users' machines,...