Sun details Java open source plans ... Microsoft and Nortel to codevelop unified comms
Today's IT News Audio Update
Sun details Java open source plans ... Google News still indexing AFP content ... Indian government blocks sites over terror links
News: Microsoft and Nortel to codevelop unified comms
News: Nuance claims breakthrough on speech recognition
News: India blocks Web sites, blogs after terrorist attacks
News: Researcher posts Google-based malware search tool
Tip: Choose when to use encryption wisely
ITwhirled: Talking iPod on the horizon?
Microsoft and Nortel to codevelop unified comms
Microsoft Corp. and Nortel Networks Ltd. will unify their efforts to develop "unified communications" products to break down the barriers between telephony, voice mail, e-mail and instant-messaging systems. The companies have struck a four-year alliance to jointly develop and sell unified communications systems, they said Tuesday.
Nuance claims breakthrough on speech recognition
Watch what you say about your computer: It's getting better at understanding your voice.
India blocks Web sites, blogs after terrorist attacks
The Indian government has blocked about 20 Web sites and blogs in India, following suspicions by the country's intelligence agencies that the sites were likely being used by terrorists to communicate with each other.
Send your love into space on a personal satellite
Forget flowers. A Japanese company is offering people the chance to say "I love you" with a personal satellite.
Microsoft sues U.S. resellers for piracy
Microsoft Corp. has filed 26 lawsuits against alleged dealers of pirated software in seven U.S. states, the company said Tuesday. Microsoft claims the companies sold pirated software or computers loaded with pirated software.
Researcher posts Google-based malware search tool
A well-known security researcher has released code that can be used to mine Google Inc.'s database for malicious software.
Choose when to use encryption wisely
By David Hill, Mesabi Group
When evaluating vendor products, look at what part of the data securityproblem they are trying to solve -- data preservation, dataconfidentiality, or both. For example, an encryption product providesfor data confidentiality. However, unless encryption key management iswell-handled, there is a risk of the permanent loss of all of theencrypted data. So you must weigh the need for data confidentiality withthe risk to data preservation. Keeping in mind that data security isabout data preservation and data confidentiality is the starting pointfor thinking about data security in greater depth.