The old saying used to be, "If you can't say anything nice, then don't say anything at all." Then the Internet came along, and the saying changed to, "If you can't say anything nice, then invent a fake user name and go to town." The Web has allowed us to get away with saying some pretty awful things...
I live in Silicon Valley, and sometimes I wonder if someone's putting something in our water. For instance, one of our local folks, who evidently treated his agorophobia by playing "Resistance: Fall of Man," has sued Sony for stealing money from him as a result of Sony's banning him from the game. ...
Right now there are potentially 1000s of ticking time bombs. ... All it will take is one 13-year-old (like the child who downloaded your 1 billionth application) who learns from his iPhone the way to quiet his 6-week-old sister is by shaking her as hard and as fast as he can and completely altering ...
Two of my favorite attractions at Disneyland when I was growing up and working at the park, and which are no longer there, were the Carousel of Progress and the House of the Future. Both showcased a future based on the thinking that was going on when I was born. They did this by creating models, min...
Last week, HP turned in a financial report that seemed to provide a strong counterpoint to the view that the world was heading into a recession, or at least that tech was going to be sacrificed to that recession. However, this took me back to IBM and what stopped its turnaround in the '90s and wheth...
Advances in technology, particularly customer resource management software, are driving e-commerce these days. In some cases, they're driving the industry down a strange road that, like a "Twilight Zone" episode, ends up in Smalltown USA, circa 1950. It's a road that has companies adopting some of t...
Security threats paint a constantly evolving landscape, and there is no end in sight in terms of threats that keep appearing. Enterprises have survived through extraordinary cycles of security threats, including the 2003 "summer of worms"; the 2004 proliferation of DDoS-based cyber extortion of onli...
Social networking is meeting an unfriendly visitor -- social engineering. Social engineering tactics -- scams that depend on user-interaction to execute an attack against them -- rose dramatically in 2006. Over the past 12 months, Internet users got a little savvier to fake e-greetings and breaking ...
IT guru Robin Bloor has thrown down the gauntlet to the antivirus software industry, but the only response he's received has been the equivalent of one hand clapping. For months now, Bloor, a partner with Hurwitz & Associates, a consulting and research firm in Waltham, Mass., has been preaching ...
In the the wake of a lawsuit seeking to blame KFC for health problems, the leading fried chicken chain on Monday said it is converting all of its 5,500 restaurants in the United States to a zero grams trans fat cooking oil. The new oil, a low linolenic soybean oil, will replace the partially hydroge...
As the nature of Internet threats has morphed, IT systems professionals and security providers have adapted their response tactics. Increasingly, organizations are developing comprehensive security strategies and implementing a variety of online and on-demand security applications and services acros...
Consumers and enterprise IT managers have to become more vigilant about spyware and adware infections to stay ahead of new threats. However, greater awareness of security issues since last year has tipped the scales slightly against intruders. That's a lesson to be learned from an analysis of data c...
Spyware has surpassed viruses as the number one threat facing your computer today. In fact, most estimates report that 90 percent of computers already have been infiltrated by spyware, which is the name given to any program that installs itself on your hard drive, collects personal information about...