Search

Results 21-40 of 64 for Andrew Burger.

The Green Technology Revolution, Part 3: Cleaner Energy, Less Waste

Major IT companies are fashioning themselves into leading worldwide proponents of clean technology as they put into use a growing battery of tools that can reduce organizations' carbon footprint -- while at the same time increasing the power, efficiency and flexibility of IT systems' architecture. W...

The Green Technology Revolution, Part 2: Easing the Burden With Virtualization

Leading IT companies are crafting ambitious green technology programs and enacting them throughout their own transnational organizations and along their supply chains, as well as promoting them to customers, as Part 1 of this series discusses. Going green costs capital, time and effort, but by findi...

The Green Technology Revolution, Part 1: Gaining Momentum

There's a lot to "green" in the global IT industry. A growing number of leading IT companies active in business lines spanning the entire industry value chain -- from chip fabrication and equipment manufacturing to retailing consumer electronics -- are now putting themselves at the forefront of the ...

Researchers Shed Light on Shadowy Russian Botnets

An investigation into the latest version of "gpicode.ai" -- a Trojan horse carrier of malware that encrypts recipients' data -- put security researchers on to a trail of clues that provides new insights into the ongoing evolution of spam-driven malware and its use by botnet operators based in Russia...

The University’s Role in Advancing Data Encryption, Part 2

Research into encryption technology is on the rise at universities and colleges, spurred on by technological advances, pressing security needs, and new legislation and regulations. Investigators in both industrial and academic settings are now looking into a wide range of areas where encryption can ...

The University’s Role in Advancing Data Encryption, Part 1

Technological advances are making adoption of network and data encryption more practical than ever, spurring its use in enterprises. Sixty-six percent of respondents to a Ponemon Institute survey said they were hatching strategic plans to meet their organizations' encryption needs, and 16 percent of...

RFID: Thinking Outside the Box, Part 2

Radio frequency identification technology vendors are now seeing demand from a wider range of end users for a broader range of applications -- from ID and access control to asset tracking, traceability and supply chain management. Vendors and developers are looking forward to the day when process im...

East-West Tech Transfer: The Greening of IT, Part 2

Governments, international development organizations and transnational corporations are looking to technology transfers and the growing number of budding green IT initiatives to address economic and social development, as well as concerns about greenhouse gas emissions, climate change and environmen...

RFID: Thinking Outside the Box, Part 1

Vendors and developers have invested large sums in RFID (radio frequency identification) and heavily promoted its use, especially in the retail, credit card and transportation industries, as well as across sectors for supply chain and inventory management. Retailers, among others -- small and medium...

East-West Tech Transfer: The Greening of IT, Part 1

The sharing of new technology -- particularly in the high-tech sector -- is taking place faster than ever before, yet economics, political and socio-cultural differences, vested interests and national agendas remain obstacles constraining the potential benefits. To a greater degree than in previous ...

What’s Eating Citywide WiFi, Part 2

Mayors and city governments around the U.S. bought into citywide WiFi project plans, which often included unsupportable performance claims and grossly inflated forecasts for the numbers of users they would attract. Those decisions have come back to haunt them and have led to some abrupt reversals of...

What’s Eating Citywide WiFi, Part 1

In their eagerness to bring the benefits of wireless internetworking to their cities, mayors in Chicago, Houston, San Francisco and other U.S. cities have bought into untested, inflated claims. Now, they are revising their plans to roll out municipal WiFi networks. Last month, Chicago began backing ...

Beyond Text: Intensifying Multimedia Search

The stakes are rising in the race to develop multimedia search engines capable of searching, indexing and cataloging the growing amount of music, images and video available on the Web. The challenges are substantially more involved and complicated than traditional text searching. A lack of resources...

Meeting SOA and Web Services Security Challenges, Part 2

Making use of distributed computing, such as service-oriented architecture and integrated Web application services, means greater complexity and security design challenges for organizations and IT managers. Open standards play a big role in developing and making better use of efficient and effective...

Meeting SOA and Web Services Security Challenges, Part 1

Software designers and developers are being challenged to build efficient security measures into their project work as computing is increasingly distributed via Web application services and service-oriented architecture. Research recently conducted by the Ponemon Institute and CipherOptics found tha...

Bringing P2P File-Sharing Out of the Shadows, Part 2

The number of consumers downloading music from authorized sites could exceed that of peer-to-peer, or P2P, users this year, according to research conducted by the NPD Group. The growth rate of downloading of copyrighted material via file-sharing services may have slowed down last year to around 8 pe...

WEEKEND FEATURE

Bringing P2P File-Sharing Out of the Shadows, Part 1

The growth rate for illegal downloading of copyrighted material via peer-to-peer file sharing services slowed somewhat during 2006, while use of their legal counterparts picked up, according to recent research. Nonetheless, open and walled-off P2P services -- so-called darknets -- remain the primary...

The Emergence of Next-Gen Networks, Part 3: WiMAX

Network connectivity has quickly and quietly become necessary -- and is sometimes even taken for granted -- in today's high-tech, instant-communications environment. With the emergence of next-generation networks has come the need to comply with new, more stringent information security regulations a...

The Emergence of Next-Gen Networks, Part 2: Wireless

With the emergence of wireless networking, ultra slim notebooks, PDAs and smartphones, mobile communications have quickly become an integral part of doing business. Mobile capabilities are set to take another leap forward with the introduction of new standards for wireless broadband wide- and local...

The Emergence of Next-Gen Networks, Part 1

Enterprise IT departments are straining despite huge increases in network capacity in the past decade. There are growing concerns over bandwidth availability, interoperability and security, as online video, VoIP, social networking and on-demand application services proliferate. Network providers are...

Technewsworld Channels