Exclusives

The Obama administration has recently turned up the heat on moving to IPv6, the next version of the Internet protocol after the one currently in use, IPv4. Federal CIO Vivek Kundra issued a memo Sept. 28 instructing CIOs of executive departments and agencies in the federal government to take several...

If you're a parent of young children and you've sat through any number of bad "family" movies during a crowded matinee, then you've probably thanked Disney/Pixar for conjuring up the likes of Buzz Lightyear and Woody, Nemo and Dory, Mike and Sully, Mr. Incredible, Wall-E, Lightning McQueen and Remy ...

How do you allow consumers to modify the software that's on their desktop computers -- to be able to take parts of Windows, iTunes and Photoshop and put them on the same screen -- without having the entire legal departments of Microsoft, Apple, Adobe and other companies knocking on their doors? The ...

Dom Sagolla doesn't have to dig deep into his own Twitter profile to look back on his very first tweet. It just happened to be one of Twitter's very first tweets -- tweet #38, to be exact, appearing March 21, 2006. "Oh this is going to be addictive," it read. "It was so easy and simple that I felt t...

Following a breach of its computer systems a year ago, Heartland Payment System, one of the five largest payment card processors in the United States, came under considerable pressure to strengthen its IT security, and it's been embroiled in several lawsuits because of the breach. In January 2009, h...

In wanting to give peace a chance, the Dalai Lama and John Lennon don't have much company; fighting and causing trouble seem to be the preference of most of the world. The conflicts in the Middle East and Afghanistan, to name the most prominent, are taking their toll on human life and limb. However,...

The Information Security Forum may bill itself as the world's leading independent authority on IT security, but the companies and agencies that its members work for are finding themselves more dependent than ever on its computer security expertise. Current trends that are expanding access to network...

When Amazon began offering cheap pay-as-you-go access to computing resources in the cloud to the public, it broke new ground. Independent developers, small businesses and individual departments of large businesses leaped at the chance to work on projects while keeping infrastructure costs down. User...

Cybersecurity is a shambles in the U.S., but nobody seems able to do anything about it, and things appear to be going from bad to worse. Both Presidents George W. Bush and Obama have promised to appoint a cybersecurity czar -- or "cybersecurity coordinator," as the current administration calls the p...

Nokia is gearing up to make moves in both hardware and software. Its next flagship phone, the N97, is gearing up for release in Europe in the first half of this year -- though availability in the U.S. is still hazy. On the software side, the Symbian Foundation is scheduled to begin operations within...

EXCLUSIVE INTERVIEW

Flexibility Rules: Q&A With Beliefnet CTO Jason Rodriguez

If you are a regular visitor to the multi-faith Web site Beliefnet, or if you subscribe to its e-mails, you may have noticed the site is becoming a little more playful. Something new -- a quiz or prayer tool or connection to a social networking site -- is introduced every month. However, the word CT...

Just three and a half years after Christina Lampe-Onnerud founded Boston-Power to bring new battery technology to devices large and small, her company forged a deal with PC maker HP, which will be the first computer maker to offer laptops with the new Sonata battery. The Sonata can be charged and re...

In this age when an Internet eon is roughly the equivalent of a calendar year and any given company titan can flicker out of existence in a flash, few companies, especially those solely Internet-based, are seen as enduring and solid and fated for perpetuity. Among these rarities, the world's largest...

High-profile data breaches continue to spotlight the growing risks consumers face of identity theft and credit card fraud. Four highly visible data breaches disclosed in the last 18 months are particularly worrisome because they show a systemic failure in the procedures that both the public and regu...

E-books are still plugging along, not quite an afterthought in the publishing industry but not the hailed champion either. Like their newspaper cousins, book publishers are at a crossroads but completely stumped as to which way to turn, so they are largely sitting around just talking about it. At so...

Technewsworld Channels