In the days and weeks following the London bombings, there will be warnings that IT managers need to heed and others need to ignore, especially when feelings are still raw. The problem is that there are people who will think they can profit from terror. Now, its not terrorists themselves or the politicians that Im […]
New Trojan Attack The United States Computer Emergency Readiness Team has received reports of an e-mail-based technique for spreading Trojan horse programs. Once opened, the malicious code can collect unauthorized information that can be exploited for various purposes, or permit computers to be used surreptitiously for other malicious activity. Unlike the usual viral attacks, the […]
Sometimes, the people you expect to be competent at what they do confound you big time. The latest example of this involves a purveyor of financial crack to the middle class, a credit card company. Said credit card company, a very large one in the field, threw some e-mail my way the other day that […]
Well, it seems that the Intel juggernaut is heading onward to the Wi-Fi chip sector. ABI Research of Oyster Bay, N.Y., figures that Intel in the last quarter was the No. 1 seller of chips in the Wi-Fi g and a/g market. This is not good news for former market leaders Broadcom and Atheros. But […]
The news of Apple switching to Intel processors in the next year or so was the big story coming out of Apples recent Worldwide Developer Conference. While punditry has abounded concerning the reasons for Apples switch, my take on the change is somewhat different. I dont think it had much to do with PowerPC architecture […]
Ive never liked Bluetooth devices. They have always seemed finicky to me, especially the process where they “pair” with each other in order to communicate. It may well be that this dislike stemmed from a review I tried to do a few years ago on a Bluetooth headset for mobile phones. I spent many hours […]