Getting around the defense mechanisms that malware writers erect isn't easy. From packers to run-time obfuscators, software-armoring techniques create problems for reverse engineers and...
Virtual worlds can have some very real security concerns-something security researchers Charles Miller and Dino Dai Zovi showed Feb. 16 at the ShmooCon 4...
My recent review of Microsoft's Response Point awakened in me an interest in speech recognition technology. Microsoft's product utilized speech recognition to help users...
The struggling Yahoo laid off 1,000 workers this week. Gone are its vice president of marketing, senior manager of integrated campaign strategy and vice...
Network management techniques for handling peer-to-peer applications don't violate the Federal Communications Commision's network neutrality principles, Comcast said this week in its first extended...
When Google unveiled Android last Nov. 5 the company positioned the open-source mobile operating system as a complete stack: operating system, middleware, user-friendly interface...
ORLANDO, Fla.-IDS Scheer, which has made its living building business process modeling software, is developing its own execution engine.But company officials acknowledge that they...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...