Chandrasekar explained that through the OverflowAPI, Google now has continuous access to the APIs that pull public data from Stack Overflow. These APIs enable access to the same data available to the Stack Overflow community via its public APIs.
The 10 California jurors who will decide the rights and wrongs in the battle between Apple and Samsung were sworn in late Monday and alongside instructions on how to proceed during the case, the U.S. judge presiding over the case explained to them the basics of the high-profile battle.
Amid concerns that users of its Window XP Service Pack 3 operating system may be vulnerable to online attacks, Microsoft has finally broken its silence and explained which XP users need to upgrade their Adobe Flash Player software.
In January, Kevin Kelly wrote an essay entitled "Better Than Free" that explained which concepts held value on the Internet. This generated a lot of interest, mostly around the question of how best to make money out of these concepts. As a career security guy, I found myself wondering how on earth my field will respond -- how does security need to adapt to support business models based on these values? When we're used to locking everything down, how do we respond when people start calling for openness?
Warren East, the outgoing CEO of UK chip design company ARM, has never displayed the bravado of his counterparts across the Atlantic, and that was on show Tuesday when he explained his surprise decision to leave the company on July 1.
First of all, there is something that I meant to discuss a few weeks ago that surprisingly has not got much coverage. Art Medlar, a fellow inhabitant of a mail list I subscribe to explained that he is a client of TD Ameritrade, and being a cautious kind of guy he used unique primary and alternate e-mail aliases for his account.
A U.S. district court judge Friday barred VoIP provider Vonage from signing up new customers after the company lost a patent infringement lawsuit to Verizon. The judge in the case denied Vonage's request to stay an injunction pending its appeal of a patent infringement ruling. On March 8, a federal jury found that Vonage infringed three Verizon patents and must pay $58 million in damages plus royalties. Verizon sued Vonage last June, alleging the VoIP provider had violated seven of its patents involving pa
A couple of months ago, Netcordia Founder and CEO Terry Slattery started to share with me technology tips that he has picked up during his 20 years of troubleshooting networks (read his previous tip about root bridge selection). Recently Slattery explained two tips, one for determining routing origins and another to avoid Hot Standby Router Protocol (HSRP) errors.
Michael Tessler cofounded BroadSoft in 1998 after coming from Alcatel, and has since grown it into a publicly traded company with annual revenue of more than $160 million. In a recent interview with IDG Enterprise Chief Content Officer John Gallant, Tessler explained how Broadsoft sees the hosted communications landscape and the role of mobile devices.
I still don't know for sure why the government tried so hard to keep the pending electronic passport from being too secure, but it's beginning to look like we should apply the old adage "Never ascribe to malice what can be adequately explained by stupidity."
I still don't know for sure why the government tried so hard to keep the pending electronic passport from being too secure, but it's beginning to look like we should apply the old adage "Never ascribe to malice what can be adequately explained by stupidity."
I'm sometimes asked why there's a division between so-called "user-centric" identity and "enterprise-centric" identity. And as it's true that both approaches have a lot in common, I've struggled a bit to find the definitive differentiator, but I think a couple of friends have given me the pointers I need.
Experts hired by Apple and Samsung explained and justified their differing damages claims to a California jury Monday as the latest battle between the two smartphone giants moves closer to a conclusion.
Experts hired by Apple and Samsung explained and justified their differing damages claims to a California jury Monday as the latest battle between the two smartphone giants moves closer to a conclusion.
The wireless spectrum, and the way it's regulated by the FCC, can be a little confusing to the novice, but gaining a layperson's understanding of the national airwaves isn't graduate-level stuff.
Developers of the IT Infrastructure Library plan to publicly release on May 30 the second large revision of the best practice framework. Here are some questions and answers to help explain the role ITIL could play in your IT shop.
So why couldn't we sign up? Jim explained that the databases for the community were basically empty, and lacking any solid data, the system just rejected us.
Last week, SBC Communications announced a large enterprise VoIP deployment at Ford Motor. When completed, the project will be one of the nation’s largest IP telephony deployments to date. To our knowledge, it would be the largest single-customer deployment offered and managed by a service provider.
In a statement, SBC explained that it will deploy a fully customized system based on its PremierSERV IP Telephony Advantage platform and using Cisco’s IP Communications system.
The government-owned Sierra Leone Telecommunications (Sierratel) explained on Friday that it has chosen to use a CDMA phone system based on its need to leapfrog to a next-generation network, which will enable the company to offer 3G services.
Enterprise Management Associates has been tracking network change and configuration management, or NCCM, for several years now. The better products now do far more than just change and configuration, though - they directly support issues of policy and compliance, service provisioning, service assurance and in some cases operational automation.
I recently looked at one company's industrial Ethernet evolution, and this week analyst firm Frost & Sullivan explained the reasons behind the growth of the technology in this new sphere.
In the previous articles in this short series, I explained that I have long sought a system for using proximity devices as the basis for identification and authentication, especially in the medical environment where most users are under too much pressure to tolerate logon/logoff procedures. Such applications would benefit from a system that automatically allows session initiation when an authorized user approaches a workstation and then either suspends access or terminates the session when the user needs t
Driving while talking on mobile phones is dangerous, as I explained in the previous column. In this column, I review some resources for knowing what various jurisdictions in the U.S., Canada and Europe have decided about the practice.