Microsoft
ZDNet, 10/16/02: Beta hack rattles Microsoft
By Robert Lemos
Microsoft is investigating a security breach on a server that hosts its Windows beta community, which allows more than 20,000 Windows users a chance to test software that is still in development.
As a result of the break-in, Microsoft advised beta testers to change their passwords late last week. However, company spokesman Rick Miller downplayed the significance of the incident, saying the online trespasser didn't get access to the company's crown jewels: its source code.
[more]
Computerworld, 10/17/02: Ballmer admits Licensing 6.0 problems for users
Sandra Rossi, Computerworld Today
On a mission to "help people realize their full potential," Microsoft Corp. Chief Executive Officer Steve Ballmer flew into Sydney this week inviting Australian IT managers to resolve their "licensing issues" by dealing with him directly.
[more]
Dell
Fortune, 10/28/02: The PC's New Tricks
The PC world is in a funk. Consumers don't want new machines, businesses aren't upgrading, and Michael Dell is grabbing all the profits. So what's a rival PC maker to do? Sell new software, build new devices--and pray that innovation brings customers back.
[more]
Mobile
NewsFactor, 10/16/02: RIM Unveils Global BlackBerry Smartphones
Jay Wrolstad , Wireless.NewsFactor.com
Continuing its push into the converged device market, Research In Motion (Nasdaq: RIMM - news) (RIM) today unveiled two new data and voice-enabled BlackBerry handhelds, both of which operate on the global GSM/GPRS wireless (global system for mobile communications/general packet radio service) network standard.
[more]
Networking
Business 2.0, 10/17/02: A Network of One's Peers
Peer-to-peer ad hoc network technology is really cool -- but where's the money?
By Rafe Needleman, October 17, 2002
One of the most interesting technologies I've covered is ad hoc wireless mesh networking, in which each radio handset becomes a router, not just an end point. In a mesh network, portable devices -- which could be cell phones but are more likely to be PDAs or laptops-- can talk to each other directly, via a nearby third handset, or even through a string of handsets, bucket-brigade-style. That means you'll be able to wirelessly transfer a file to someone next to you even if there's no wireless infrastructure in range. If one handset goes out of range, another takes its place.
[more]
7:54:26 AM
|