1. Going green with DC power

    Date: 12/19/07 (Data Management)    Keywords: technology

    Which has a larger carbon footprint: your neighbor's gas guzzling SUV or the server in your machine room? The answer might surprise you. In a recent report from the Global Action Plan, the average server has a larger annual carbon footprint than an SUV getting 15 MPG. Information technology...

    Source: http://blogs.zdnet.com/BTL/?p=7403

  2. Lloyd Taylor: LinkedIn's 'scaling guru' tackles the social graph

    Date: 12/19/07 (Data Management)    Keywords: technology, google

    Earlier this month I spoke with Lloyd Taylor, vice president of technical operations at LinkedIn and formerly Google's director of global operations and Keynote Systems' vice president of technology and operations. He discusses his past experience building and scaling data centers at Google and how it differs from his new...

    Source: http://blogs.zdnet.com/BTL/?p=7411

  3. IBM buys database software firm Solid Information

    Date: 12/21/07 (Data Management)    Keywords: software, technology, database

    Deal expected to close in early 2008; financial details not disclosed. International Business Machines said on Friday it has agreed to buy in-memory database software provider Solid Information Technology from private owners for an undisclosed sum. Solid's largest owners were private equity firms Apax Partners and CapMan. ...

    Source: http://news.zdnet.com/2110-3513_22-6223858.html

  4. argh.

    Date: 12/27/07 (Computer Help)    Keywords: technology, virus, antivirus

    Okay, here's the deali-o. My dad just recently purchased a brand spankin' new computer (it's gorgeous) thus meaning he didn't need his old one anymore, so he gave it to me (hooray!) I've always wanted my own computer so I was psyched, he had antivirus stuff on it and everything so I wouldn't have to worry.

    The problem? It's pulling a sleeping beauty and won't wake up from its slumber. THAT'S the problem.

    I hooked it up properly (I alwas hook up computers for my mom and dad, they are illiterate when it comes to technology) so I know I didn't accidently touch something that shouldn't have been touched.

    When I turn on the monitor, however (after turning the computer on) the screen says 'Going to sleep' then proceeds to do so. At first I thought it was just the monitor so I tried a few different ones (my mom's boyfriend is a pack-rat. He has like... ten screens.) and each of them goes to sleep.

    Does this mean the computer is on stanby mode? How do I fix it?

    Please help. It figures when I actually get a computer it would bugger up.

    Ah, I don't know if this matters... but when the computer was hooked up to my father's house, he had the side taken off so it wouldn't overheat. But he put it back on when I brought it to mom's. Is it possible he may of touched something when he put it back on?

    Thanks, in advance, for listening to my problem.

    Source: http://community.livejournal.com/computer_help/852143.html

  5. New Computer Security Conference

    Date: 12/31/07 (Algorithms)    Keywords: software, technology, asp, security



    We are excited to announce SOURCE Boston, a new computer security conference taking place in Boston, Massachusetts on March 12-14, 2008. SOURCE combines business, technology, and software development, and provides security experts an opportunity to share ideas, insights and opportunities.

    SOURCE Boston will include the following:

    * An intimate setting provides opportunities for networking, focused conversations, opportunities to converse with speakers and industry thought leaders
    * Top keynote speakers, including Steven Levy, Dan Geer, and Richard Clarke.
    * Special VIP evening reception
    * First con to combine the edginess and creativity of hacking with the professionalism of the business environment.
    * First computer security conference to have a track devoted to application security
    * Combines industry and professional sessions with edgy fun approaches
    * First L0pht reunion in ten years
    * Business track will include talks from chief executives and other key members of the management community
    * SOURCE Boston is organized by key industry thought leaders, including former founders of @stake, professionally published security research experts, and former NSA employees
    * SOURCE Boston takes place the week before St Patrick’s Day – one of the most exciting times to be in Boston. Additionally, the Hyatt rate will be extended into the weekend so attendees can experience Boston’s St. Patrick’s Day celebrations.


    Additional speakers include:
    * Matthew Moynahan, CEO of Veracode
    * James Mobley, CEO of Neohapis and former CEO of @stake
    * Andy Jaquith, Yankee Group
    * Cedric Blancher, EADS
    * Robert Martin, MITRE
    * Senior Members and Founders oof Cult of the Dead Cow
    * Michael Rash, Author and Security Researcher

    Cost:
    $895 per person
    $195 student/volunteer rate

    We are also looking for volunteers to assist us during the con. Please email info@sourceboston.com for more information.

    HTTP://WWW.SOURCEBOSTON.COM

    Please go to http://www.regonline.com/Checkin.asp?EventId=167940 to purchase tickets.

    See you in March!

    Source: http://community.livejournal.com/algorithms/96641.html

  6. Technology Voters' Guide: Ron Paul

    Date: 01/03/08 (Security)    Keywords: technology

    Republican thinks a free market is key to broadband expansion and that feds should stay out of mergers and social networks.Special coverage: Election 2008 Iraq, immigration, taxes, and health care probably have been the four most pressing topics of the 2008 presidential campaign. Technology has made nary an...

    Source: http://news.zdnet.com/2100-9588_22-6224161.html

  7. Disaster recovery means rolling back the clock

    Date: 01/04/08 (Data Management)    Keywords: technology

    A Kusnetzky Group client and I had a rather intense discussion about the role virtualization technology could play in a disaster recovery strategy. Although the strategy this organization was currently pursuing appeared to be based upon sound foundations, it didn't go far enough. This organization really didn't have a plan ...

    Source: http://blogs.zdnet.com/virtualization/?p=313

  8. Data theft, the armed variety

    Date: 01/08/08 (Data Management)    Keywords: technology, web, hosting

    Computerworld chronicles the tale of Web hosting firm C I Host Inc. and details how its data center was robbed. Meanwhile, the technology manager working the graveyard shift was held hostage as the robbers stole computer equipment. The story's point can't be more clear: Data centers aren't...

    Source: http://blogs.zdnet.com/security/?p=789

  9. Data theft, the armed variety

    Date: 01/08/08 (Security)    Keywords: technology, web, hosting

    Computerworld chronicles the tale of Web hosting firm C I Host Inc. and details how its data center was robbed. Meanwhile, the technology manager working the graveyard shift was held hostage as the robbers stole computer equipment. The story's point can't be more clear: Data centers aren't...

    Source: http://blogs.zdnet.com/security/?p=789

  10. Can open source cut campaign costs?

    Date: 01/10/08 (Open Source)    Keywords: technology

    If this were 1996, and neither McCain nor Huckabee had the capability to energize their support cheaply, using technology, would they stand a chance?

    Source: http://feeds.feedburner.com/~r/zdnet/open-source/~3/214449263/

  11. Hilton Hotels CIO: Tim Harvey - Transcript

    Date: 05/02/07 (Data Management)    Keywords: technology

    Dan Farber: Tim, thanks for joining me. Tim Harvey: Thank you Dan for having me. Dan Farber: Now Hilton is a very large-scale operation, 3000 hotels, 500,000 rooms, across 80 countries. How do you manage deploying technology across such a diverse set of...

    Source: http://video.zdnet.com/CIOSessions/?page_id=144

  12. Unbreakable: PKI is alive and kicking

    Date: 01/10/08 (Security)    Keywords: technology, security

    Many organizations are starting to deploy certificates to secure critical pieces of business including e-mail, mobile access, and digital signaturs. The SaaS model is key factor for PKI comeback says ChosenSecurity's John Adams Commentary--Today, there is a wide range of technology, products and solutions for securing an enterpris'’s...

    Source: http://news.zdnet.com/2424-9595_22-182915.html

  13. 2008 Fellow Award Nominations

    Date: 01/11/08 (Computer Geeks)    Keywords: html, technology

    "The annual Computer History Museum Fellow Awards program publicly recognizes individuals of outstanding merit who have significantly contributed to advances in computing technology or applications, and to the evolution of the information age."

    It's time for nominations again, and the museum has opened the process to the public. This year they've opened the nomination process to the public.
    http://www.computerhistory.org/fellowawards/nominations for how to nominate.
    http://www.computerhistory.org/fellowawards/hall_of_fellows.html for a list of who's already in.

    This is a nice honor, and I hope some of you will think of people to nominate. In response to the white maleness of it all, I'm nominating Cynthia Harvey, Morgan State University/NASA, and Thelma Estrin. You can, too. Not that I"m against white males: I'm also hoping to get nominations for Will Wright and Sid Meier. That's an uphill battle, though, because the museum isn't very supportive of the games community. Still, if we start now, maybe we can gain some traction.

    Or maybe you know someone else who deserves recognition. This is the closest we have to Oscars for Geeks, so let's use it! Spread the word.

    Source: http://community.livejournal.com/computergeeks/1141790.html

  14. New torrent technology a serial industry killer

    Date: 01/14/08 (Open Source)    Keywords: technology

    The rapid improvement of Torrent technology, based on open source, will transform TV, just as VOIP tools like Skype are changing telephony, enabling integration with other data services.

    Source: http://feeds.feedburner.com/~r/zdnet/open-source/~3/216571373/

  15. Nanopictures on your diamonds? Really?

    Date: 01/16/08 (Web Technology)    Keywords: technology

    If this press release is not a hoax, you should soon be able to inscribe your favorite photos on the diamonds and other precious gems you already own. A Silicon Valley firm, Gemory LLC, says it has developed 'a new nanotechnology process that permanently inscribes high-resolution photos on any diamond...

    Source: http://blogs.zdnet.com/emergingtech/?p=805

  16. Arbor Networks abandons security space

    Date: 01/21/08 (Security)    Keywords: technology, security

    I was actually in Ann Arbor last week when news broke that Arbor Networks had acquired Ellacoya a so called "deep packet inspection" technology vendor. I was perplexed. That's not security. First let me clear up some terminology. "Deep Packet Inspection" was...

    Source: http://blogs.zdnet.com/threatchaos/?p=508

  17. what are your opinions on RFID passports?

    Date: 01/25/08 (Web Development)    Keywords: html, technology, database, security, web

    I realize that this is a webdev group targeted at web application developers, but since we all know a thing or two about security, I was wondering what all of you think about RFID chips in passports?

    Basically it's a radio-frequency chip that will be issued in new passports in the U.S. The chip will contain personal information, an image of what a person looks like, and can be read by an RFID reader when placed up close - it is then transferred over a wireless network to a database. The technology is "similar to what is used at Wal-mart to track goods" (Source: http://www.washingtonpost.com/wp-dyn/content/article/2007/12/31/AR2007123101922.html)


    Do you think this idea is safe in terms of identity theft?
    Should this idea continue?

    I am just curious as to what all of you think, not taking any polls or anything, but just trying to get a conversation going :)


    In my opinion, I think as long as there will be new secure measures of holding on to information, hackers will dedicate more time on trying to exploit what they find.

    That's what they're paid for!


    You can read more about it here if you don't believe me: http://travel.state.gov/passport/ppt_card/ppt_card_3926.html

    Source: http://community.livejournal.com/webdev/461070.html

  18. Trigence - datacenter application virtualization

    Date: 01/25/08 (Data Management)    Keywords: technology

    John Hamilton, EVP and Chief Operating Officer of Trigence, and I had a long discusion about application virtualization recently. One of the more challenging issues for suppliers of application virtualization technology is that there are many competitors each presenting different types of technology and this leaves many organizations feeling confused....

    Source: http://blogs.zdnet.com/virtualization/?p=328

  19. Should government enter the payment business?

    Date: 01/28/08 (Security)    Keywords: technology

    John Battelle thinks real-world payment processing would be an ideal business for local governments to get into. He notes that it's already in this business in the form of automatic toll-payment technology; in the Bay Area, it's called FasTrack. And apparently, commuters will now be able to use their FasTrack...

    Source: http://government.zdnet.com/?p=3628

  20. Sun xVM - Foundation for a dynamic datacenter?

    Date: 01/29/08 (Data Management)    Keywords: technology

    I've been meaning to post something about my conversation with Sun's Steve Wilson about xVM  for a while but, other things kept getting in the way. Steve and I have spoken often in the past and I've always enjoyed his insight into virtualization technology as a whole, how organizations could...

    Source: http://blogs.zdnet.com/virtualization/?p=330

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home