Ideology still a driving force behind hacking in many cases

NetworkWorld writes that “[t]he figures from the latest Web Hacking Incidents Database Annual Report suggest that stealing money and data is not always the overriding motivation for hackers, although it has been a rising trend in recent years.  ‘While financial gain is certainly a big driver for Web hacking, ideological [...]

By |2016-12-21T00:14:57-05:00February 26th, 2009|Blog, Uncategorized|

Troubled Asset Relief Program means trouble for highly-skilled H-1B workers

On February 6, the U.S. Senate voted to put stricter limits on banks and other recipients of taxpayer money through the Troubled Assets Relief Program, or TARP, that want to hire high-skilled workers from overseas under the H-1B visa program.  The Senate approved the measure – introduced by Senators Charles [...]

By |2016-12-21T00:14:57-05:00February 24th, 2009|Blog, Uncategorized|

SF Chronicle readers pitch their business ideas to VCs

 The San Francisco Chronicle has an interesting and fun articlein which venture capitalists comment on ideas for startups that were submitted to the paper by its readers.    Yahoo!Tech reportsthat “Amazon.com's product search engine appeared to malfunction early Tuesday, with searches for well-known books and CDs producing no results.  At [...]

By |2016-12-21T00:14:58-05:00February 24th, 2009|Blog, Uncategorized|

Developers upset by opaque Apple App store criteria

Yahoo!Tech has an interesting article on the mysterious criteria used by Apple’s App store to approve or reject an application, and on a movement “growing within the developer community” to persuade Apple to use a more open and transparent application process for new iPhone apps. The International Herald Tribune has [...]

By |2016-12-21T00:14:58-05:00February 23rd, 2009|Blog, Uncategorized|

Republicans want sweeping new data retention requirements

CnetNews.com reports that “Republican politicians on Thursday called for a sweeping new federal law that would require all Internet providers and operators of millions of Wi-Fi access points, even hotels, local coffee shops, and home users, to keep records about users for two years to aid police investigations.  The legislation, [...]

By |2009-02-20T16:39:52-05:00February 20th, 2009|Blog, Uncategorized|
Go to Top