Quantcast
Channel: analyst – the loose wire blog
Browsing all 14 articles
Browse latest View live

Is It Back To Basics For The PDA?

What do you want in a PDA? The Register carries a story that seems to belie the conventional wisdom that folk want everything in one device. It quotes Jupiter Research as saying that vendors are...

View Article


Russia Gets Serious About Its Virus Writers?

Is Russia finally getting serious about its virus writers? Kaspersky Labs and F-Secure, two anti-virus manufacturers, report that Evgenii Suchkov (or Eugene Suchkov, sometimes known as Whale or...

View Article


Getting Into the Rhythm of Online Passwords

I started writing about phishing a long time ago, it seems now. It must be at least two years, I think, maybe more. Then it seemed a very obscure activity, and I can recall one editor being less than...

View Article

From the Ashes of Blue Frog

The Blue Frog may be no more,  but the vigilantes are. Seems that despite the death of Blue Security in the face of a spammer’s wrath, the service has built an appetite for fighting back. Eric B....

View Article

The Commuter’s Shopping Impulse

A good piece that explores the point I was trying to make earlier about the commuter element in cellphone service adoption, from Reuters’ Sachi Izumi (via textually.org). Someone needs to look closely...

View Article


Image may be NSFW.
Clik here to view.

Phone as Beacon

The idea that your cellphone may become a beacon of your availability took one small step closer yesterday, although you’d be forgiven for not noticing amid all the post-turkey bloat. The theory is...

View Article

Data, WikiLeaks and War

I’m not going to get into the rights and wrongs of the WikiLeaks thing. Nor am I going to look at the bigger implications for the balance of power between governed and governing, and between the U.S....

View Article

The Fate of New Acquisitions: Whither or Wither?

By Jeremy Wagstaff I’m writing this on a Windows PC using a great piece of Microsoft software called Windows Live Writer. And that’s only part of the problem. As you no doubt know, Microsoft have...

View Article


DigiNotar Breach Notes

Some folk have asked me for more details about the DigiNotar breach after my brief appearance on Al Jazeera this morning. So here are the notes I prepared for the segment. Links at the bottom....

View Article


The Real Revolution

This is also a podcast, from my weekly BBC piece.  While folks at the annual tech show in Vegas are getting all excited about a glass-encased laptop, the world’s thinnest 55″ TV and a washing machine...

View Article

Under the Wire

Under the Wire The Latest Software and Hardware Upgrades, Plug-Ins and Add-Ons from the 29 May 2003 edition of the Far Eastern Economic Review, (c) 2003, Dow Jones & Company, Inc. Slow Upgrade...

View Article

Image may be NSFW.
Clik here to view.

Update: Blasting the Worm

 From the guys at Security Magazine, an update on the Blaster worm, or LovSan, as they call it: Malware writers have spawned multiple variants of the Lovsan worm, the most dangerous of which installs a...

View Article

Image may be NSFW.
Clik here to view.

News: RFID Tags’ Dirty Secret

 A story from Reuters that says one of the biggest hurdles facing RFID tags — the widgets that store information about products — is that they still aren’t very good. “The tags fall far below the 99...

View Article


Image may be NSFW.
Clik here to view.

Update: More DRM Woes For Online Music

 Further to my previous post about DRM, or digital rights management, here’s a story from IDG News Service about software that may allow Windows-using customers of Apple Computer Inc.’s iTunes Music...

View Article
Browsing all 14 articles
Browse latest View live