don't learn from previous IT snafus
Hazy goals and a culture of hiding problems lead to more
multimillion-dollar disasters. But now that most companies are only as stable as their bits and
bytes, the consequences of information technology screwups aren't easily disguised - they show up in earnings reports. Source: ComputerWorld
(Oct 31, 2000)
2000 Tech Enthusiast
The essential resource for hard-core Windows 2000
enthusiasts! A new web page from Microsoft featuring tips,
power features, articles, and a Geek of the Week contest.
Europe's Cybersleuth Central
Hunched over a computer inside a
building that once served as Gestapo headquarters, Paulo
Felix hunts down clues that he hopes will lead him to
Europe©s most hardened criminals. The cybercriminals he
pursues are hardly blue-haired, teen-aged hackers or Web
pranksters. Felix puts it this way: ©Along with their
computers, they also have guns.©
The home of Tom and Deb Shinder, who have authored or
contributed to fifteen books on the Windows 2000 operating
system, and are regular columnists at swynk.com
Stakes Hacking - Euro Style
In the United States, a hacker is usually viewed as a teen-age,
blue-haired nuisance who defaces Web sites. Maybe he ends up
in court, and even in handcuffs © but he doesn?t end up
hanging from a tree. Not the case in Europe, where a
legendary 27-year-old German computer hacker was found hung
by his own belt in a Berlin park two years ago. On that side
of the Atlantic, a place where stealing Internet access is
sometimes a necessity and computer hardware is often
archaic, hacking is hardly a game.Source:MSNBC
the Tech Industry out of ideas?
A funk has settled over the U.S. technology industry. It's
not just the little matter of crashing market values of so
many tech companies. Not even the palpable sense that a
fantastic and thrilling financial bubble has burst. Money is
only part of the trouble. Source: USA Today
It's been a while since someone made a new "killer
app" Well, this is it. VMWare lets you run multiple operating
systems on the same computer (at the same time) by emulating
a virtual PC for each. This is so cool, you have to see it
to believe it.
Sam wants (to serve) you...on the Web
A look at how three federal agencies - the Air Force,
Securities and Exchange Commission and Treasury - are
building networks to make it more convenient to get
information, submit required business documents or make tax
and loan payments to Uncle Sam.
Source: NetworkWorld Fusion (Oct 19, 2000)
security upgrade promises a safer 'Net
An emerging technology promises to improve the security of
the Internet's infrastructure by preventing hackers from
hijacking Web traffic and redirecting it to bogus sites.
Source: NetworkWorld Fusion (Oct 18, 2000)
I don't want to be notorious
In this extensive interview, the -- yes, notorious -- hacker
talks about social engineering, ID theft, 60 Minutes, and
his 12-step program for computer addiction. Source: ZDNet
(Oct 11, 2000)
scientist plans 10T-byte optical disc
Unlike conventional CD-ROMs, which are written only on the surface, data can be written on over 10,000 levels within
the 'hyper-CD-ROM' disk, meaning a single disk can hold the equivalent of 10 million standard printed books. Source:
IDG.net (Oct 12, 2000)
Windows 2000 PKI: Contender or Pretender?
Why contemplate Windows 2000 PKI when we have vendors like Baltimore Technologies, Verisign, and Entrust? Consider the power of choosing your own blend of public and private authorities. Source:
Network Magazine (Oct 5, 2000)
Microsoft's Funny Money
It's hardly a secret that Microsoft is the fifth-biggest contributor of "soft money" to politicians but where, exactly, is all the money going? A spunky shareholder resolution demands that the company account for
its political campaign contributions. Source: Salon.com (Oct 10, 2000)
Forefathers of IT share Nobel prize
The prestigious Nobel Physics prize goes to three men who laid the foundations for the computer revolution -- including the inventor of the microchip.
Sneak peek at the next Microsoft Office
Every two years or so, Microsoft tries to sell the world on a new version of Office. Its next salvo, Office 10, has some key enhancements. Source: PCWorld
Learning IT right from wrong
To earn the Computer Science Accreditation Board seal of approval, a university's computer science curriculum must include "sufficient coverage of social and ethical implications of computing" -- a significant evolution since the first computer science curriculum taught in
The art of war meets the business of IT
A martial arts expert (and CTO at Web development company iXL) explains how the principles of the battlefield can apply to technology projects. Source: Darwin Magazine
New domain name bids unveiled
The non-profit Internet governing body that will select new domain names later this year revealed Tuesday that 47 groups have submitted more than 200 proposals for new names, including bids for a child-safe Net zone labeled ©.kids? and an adult entertainment area dubbed ?.xxx?.
Debut of the Microsoft Security Essays
The size and scope of Microsoft's security response effort has been a well-kept secret -- until now. In the inaugural issue of a new article series, take a tour of the Microsoft Security Response Center and learn how the people on the front lines of security at
Microsoft help ensure our customers' security.
Office politics imitate 'Survivor'
Opinion article from CIO Magazine with some advice for managers: One by one, the tribe shrinks until the sneakiest, scrappiest, backstabbingest survivor remains to claim the bounty. (Oct 2, 2000)