1686 articles written

Jim Wagner

Popular

CA Floats New Products, SEC Deal

Computer Associates is having a busy week. As part...

Smalltalk Creator Wins ‘Nobel Prize’ of Computing

One man's work to bring a biological model to...

BayStar Does About Face With SCO

In a new twist to its investment relationship with...

Explore

Verizon, Covad Mend Fences

Covad Communications and Verizon settled their longstanding differences and sealed the deal with a DSL line-sharing agreement. The two DSL providers agreed Tuesday to drop their respective legal disputes; Covad had filed an...

Nortel Secures Tasman Buy

Canadian manufacturer Nortel Networks is beefing up its enterprise-grade router line to meet the increasing demand for converged networks -- the blending of voice, video and data. The company acquired Tasman Networks for $99.5...

China’s Broadband Growth Expected to Top U.S.

At the rate it's going, China will next year surpass the U.S. in new broadband access lines, according to research published by telecommunications research firm Point-Topic Friday. The figures from the U.K.-based firm's third-quarter report on broadband statistics show...

Green Light For Siebel-Oracle Merger

UPDATED: Oracle has one less hurdle to jump in its $5.85 billion acquisition bid for rival Siebel . The European Commission (EC) said a merged Oracle/Siebel offering wouldn't impede effective competition in...

IBM Finds Its Micromuse

UPDATED: IBM took a step toward building up its systems-management portfolio with the $865 million purchase of Micromuse Wednesday. Micromuse's ability to add voice- and video-systems management capabilities made the company an attractive...

Oracle Fortifies Its Code Base

Database giant Oracle is hoping to rein in the number of security vulnerabilities in its software line by going outside for some help. For years, the company has been using an in-house tool to...

Guidance Software Investigating Stolen Data

Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. According to a report by the Washington Post,...

Santa IM Worm Making a List

A worm targeting the three major instant messaging (IM) networks is spreading its payload to buddy lists. The IM.GifCom.All worm shows up as an innocuous-seeming URL in a chat message screen, featuring a link...

Other Articles