Search Results

Results 3121-3140 of 3196 for Richard Adhikari

FCC Chairman Calls Comcast Liar, Critics Pile On

Comcast has lied about how and why it blocks peer-to-peer (P2P) Internet traffic, and may be lying in its promise to stop some of its practices by year end, Federal Communications Commission Chairman Kevin Martin said during a hearing held by a Senate committee on the future of the Internet ...

ISP Subscriber Info Is Private, Court Rules

The New Jersey Supreme Court has ruled that people have an expectation to privacy online and that the authorities can't just demand citizens' Internet protocol (IP) addresses from their Internet service providers without a grand jury warrant ...

STARTUP TO WATCH

Veodia: Gambling on a Better Way to Stream Video

Creating videos in-house means corporations have to either hire contractors who have their own equipment or sink thousands or millions of dollars into hiring trained staff and leasing or buying equipment. Then they have to spend days, if not weeks, editing the videos ...

Microsoft, Novell Tag-Team Against Chinese Distros

As if stepping on the Linux community's toes when they first teamed up wasn't enough, Microsoft and Novell have announced a joint push into the China market to attack the Linux installed base there ...

Student Journalist Twitters Himself Out of the Pen

When UC Berkeley journalism graduate student James Karl Buck was grabbed by police in the Egyptian industrial city of Mahalla El-Kobra while photographing a noisy demonstration, he sent a one-word text message to Twitter: "Arrested." ...

Publishers, Advertisers, Consumers Pick Sides in Online Tracking Debate

A firestorm of fury has erupted over behavioral tracking -- the tracking of consumers online by marketing companies and advertisers to serve them up with targeted advertisements when they're on the Web ...

Smarter Than Your Average Card

Think having a credit or debit card with your photo on it is cool? ...

A Burgeoning Bevy of Biometric Barriers

Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either ...

Magnificent Seven Band Together for 4G Showdown

In a bid to avoid the bitter battles that have raged around third-generation (3G) wireless technology, owners of the patents on which the fourth-generation LTE (long-term evolution) wireless technology is built have agreed to charge each other "reasonable" license fees ...

Securing Your Network, One Zone at a Time

As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other ...

Microsoft Offers Plan for Ad Data Self-Regulation

Microsoft has leapt into the brawl surrounding a recent proposal by the Federal Trade Commission to tighten restrictions on online advertising, responding with its own five-tiered plan for self-regulation ...

The Uneasy Future of Online Security

The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco ...

CONFERENCE REPORT

RSA Town Hall: It Takes a Village to Weather a Cyber Storm

How do you respond when hit by a cyber attack tsunami? ...

CONFERENCE REPORT

Chertoff on Cybersecurity: ‘Reverse Manhattan Project’ Needed

After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help ...

PRODUCT PROFILE

Microsoft Releases Forefront Stirling to Beta

Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." ...

PRODUCT PROFILE

Archer Launches Exchange for Enterprise Apps

Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations ...

CONFERENCE REPORT

Symantec CEO Calls for Federal Hacking Law

The federal government should step in and pass laws to ensure computer security, John W. Thompson, the CEO of Symantec told a security conference Tuesday ...

New Finjan Appliance Sniffs Web Traffic for Crimeware

Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference ...

TECH BLOG

Live From RSA: Getting Ready for the Security Smackdown

It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street ...

SCO’s Plan to Rise From the Ashes Flickers Out

SCO, the company everyone in the Unix and Linux worlds loves to hate, has lost its latest angel investor ...

LinuxInsider Channels