Editorial Staff
Latest From Editorial Staff
MGM v. Grokster: What Comes Next for File Sharing?
For intellectual-property attorneys, the lead-up to the recent U.S. Supreme Court ruling in the MGM vs. Grokster case was like being in a crowded sports bar before the Super Bowl. Bets were ...
Gartner Outlines Top Security Threats
Firewalls, intrusion detection and prevention, and antivirus software are the high-priority defenses information technology (I.T.) managers are pursuing this year to combat I.T. security threats, according to results of a new survey ...
Microsoft Begs To Be Hacked
June 17, 2005 12:47PM Digg It! Bookmark to del.cio.us I see all these things as somewhat sad attempts to pander to the media’s love of hacking, and a bit of wishful thinking ...
Google Takes Search Mobile
The new Google search tool for phones is mobile-provider agnostic. Any mobile user whose device includes a Web browser can access the Google main site to use the Mobile Google tools, including ...
Microsoft Steps Up Battle with Google
Bill Gates has used his appearance at an industry conference to offer Microsoft’s response to Google’s latest online offerings, announcing the incorporation of satellite imagery into location-based search results and introducing a ...
Apple, Intel Rumored To Be in Talks
Apple Computer Inc.”s computers could eventually be outfitted with chips from Intel Corp., according to reports.The two companies are reportedly in talks that, if fruitful, could result in Apple joining old nemesis ...
Chicago Ponders Citywide Wi-Fi Network
Chicago officials took the first tentative steps Tuesday toward installation of a citywide wireless network that would allow residents to connect to the Internet from easy chairs, school desks and office break ...
Apple’s New OS X Tiger Tightens Security
Apple Computer yesterday started selling Tiger, its newest operating system for Macintosh computers, which features an integrated search engine for the hard drive and a litter of small applications that the firm ...
New Worm Targets P2P Networks
April 25, 2005 12:08PM Digg It! Bookmark to del.icio.us “The hacker appears to be sympathetic to the entertainment industry and their legal strategies against people who illegally trade music and movies,” Sophos ...
Developer’s Dilemma: PHP or Perl?
Perl has been around the longest, and because it was not developed for the Web, it was very big, bulky and slow when it first appeared on the scene, according to Keith ...