QuoteA standards body called the Institute of Electrical and Electronics Engineers has been working to develop and approve 802.11i, a security standard that won't be finished for at least another year. WPA is a subset of what will become the 802.11i standard and replaces the existing security protocol, called Wired Equivalent Privacy.
QuoteFTC lawyers came to the hearing armed with confidential notes written by Rambus' outside patent attorney. They cited a half dozen instances in the mid-1990s in which they said the company had secretly applied to amend its RDRAM patent to cover technologies that JEDEC was considering for SDRAM.
QuoteThe full top 10 looks like this (percentages show total proportion of virus reports accounted for by each virus):
1. W32/Klez-H (Klez variant) 12.7 per cent
2. W32/Lovgate-E (Lovgate variant) 4.9 per cent
3. W32/Bugbear-A (Bugbear worm) 4.3 per cent
4. W32/Sobig-A (Sobig worm) 3.3 per cent
5=. W32/ElKern-C (Elkern variant) 2.9 per cent
5=. W32/Yaha-E (Yaha variant) 2.9 per cent
5=. W32/Yaha-K (Yaha variant) 2.9 per cent
8. JS/NoClose (NoClose worm) 2.1 per cent
9. W32/Flcss (FunLove) 1.9 per cent RE-ENTRY
10. Dial/Datemake-A (Datemake dialler) 1.6 per cent
Others 60.5 per cent
Quote"If AMD can get a performance boost from going to the 400MHz bus, it can get a (model number) performance boost without raising the clock speed much. It's entirely possible it would do that," said Dean McCarron, principal analyst at Mercury Research.
QuoteThe postponement comes despite the marketing efforts of Taipei's mayor, Ma Ying-jeou. Last month, Ma sent out 200,000 letters to overseas buyers in a bid to reassure them Taipei is safe despite SARS.
QuoteThe law would be enforced against those who use fraudulent practices to send bulk e-mail, commonly known as spam, to or from Virginia, a state that is headquarters for a number of major Internet providers, including the nation's largest, America Online.
QuoteAmerica Online, Yahoo and Microsoft on Monday sketched a broad outline that calls for technical changes to e-mail to make it more difficult to send the widely reviled messages. Among the steps are plans to hinder spammers from creating multiple fraudulent e-mail accounts in bulk and to determine the real identity of the senders.
QuoteIn fact, the ruling could accelerate the labels' plans to go after individual users, especially when coupled with a decision Thursday in a separate case that gives them more power to unmask the identity of individual file swappers. In that decision, a judge said Internet service provider Verizon had 14 days to turn over the name of a subscriber accused of offering music files for download using the Kazaa file-swapping service.
Quote"There is zero technical difference. It's only a matter of intent--and even the intent will be a matter of interpretation," Torvalds wrote. "This is why I refuse to disallow even the 'bad' kinds of uses--because not allowing them would automatically also mean that 'good' uses aren't allowed."
Quote"Defendants distribute and support software, the users of which can and do choose to employ it for both lawful and unlawful ends," Wilson wrote in his opinion, released Friday. "Grokster and StreamCast are not significantly different from companies that sell home video recorders or copy machines, both of which can be and are used to infringe copyrights."
QuoteThe device is slightly larger and heavier than a CD-ROM drive found on a standard desktop PC, so it may not be the smallest desktop computer on the market. However, it is likely to be the smallest based on a standard mainboard design, as other tiny PCs use specially designed, one-off mainboards.
QuoteThe study said cable modems were 50 percent faster on average than DSL connections. According to data tabulated during February, Cablevision reportedly had the fastest connections, averaging 800kbps, or 13kbps above the industry average. Comcast came in second at 794kbps, Cox in third with 688kbps and Adelphia in last with 575kbps. Time Warner Cable, the nation's second-largest cable television network, was not included in the study.
Quoteso-called buffer overflow vulnerability, which an attacker can exploit by sending more input to a program than the application expects, could allow the owner of a Web site to run code on the person's computer. Buffer overflows are an old type of vulnerability that still crop up frequently in programs. The flaw occurs in a component of Internet Explorer that delivers Web addresses to the browser from other sources--for instance, if a person clicked on a URL in an e-mail or a Word document.
QuoteVIA Technologies, Silicon Integrated Systems (SiS) and Nvidia all plan to introduce chipsets supporting the Barton-core, 400MHz FSB Athlon XP processors. VIA will add a new KT600 chipset, while SiS is expected to join the competition with its SiS748. Nvidia will launch an updated product based on its nForce2, said Drew Henry, company senior director of platform product management, in an earlier phone interview with DigiTimes.
QuoteAt present, FM radio supports datacasting over so-called subcarrier frequencies, which can deliver information at about 1.5 kilobits per second. That's sufficient for relatively light data needs, such as displaying a radio station's number on an LED screen or sending weather information to a digital watch--but little else. Yet, forthcoming digital enhancements could supercharge radio datacasting, providing feeds of up to 300kbps.
QuoteThe new software approach, called the IA-32 Execution Layer and code-named btrans, will give the forthcoming 1.5GHz Itanium 2 the ability to run 32-bit software about as fast as a 1.5GHz Xeon MP, Intel spokeswoman Barbara Grimes confirmed.