Why does at-work computing lag? The business software market is crowded because it’s lucrative — and so its winners have always tried to lock customers in. That protects revenue streams but slows change. Microsoft Office emerged in an era when you created documents to print them out. Google Docs transplanted Office’s functions to the web without fundamentally changing them. Dropbox’s developers and designers asked: What if you ditched the whole office suite and started from scratch?
I understand one of your biggest initiatives is embedded in the Veterans Administration.
Refrain from posting comments that are obscene, defamatory or inflammatory, and do not indulge in personal attacks, name calling or inciting hatred against any community. Help us delete comments that do not follow these guidelines by marking them offensive. Let’s work together to keep the conversation civil.
“Encryption and export control laws are out of control,” McNealy said. “Encryption is all about helping honest people protect their information from bad people.”
And with the right content, as fresh as a status update but polished like a magazine ad, those hard-core customers might return again and again.
Gateway seeks “realignment”: After a disappointing holiday sales season, personal computer maker Gateway is set to reshuffle its management and rework its strategy, just as it did two years ago, The Wall Street Journal reported.
When users sign up for the antivirus service, they agree to have all their e-mails routed through Marketscore servers so that the messages can be scanned for viruses.
At this year’s ceremony, Putin announced, “You have chosen (I am speaking to the parents first of all) a happy, noble, but also a very difficult path of great responsibility and worry that demands all of your efforts, patience and strength.”
Yahoo, like Rediff, had argued that it cannot be held responsible for giving access to objectionable sites. But what might come as some consolation to Rediff’s directors is that Compuserve’s director, who was charged with giving access to child pornography, eventually did not go to jail.
Data-loving parents like Fawcett say tracking is also just plain fun: For instance, in the time-lapse video below, you can see Fawcett’s graph of his son’s sleep patterns from age zero to one, where a blue bar means sleeping and yellow means awake. He loves that the data “neatly shows how we emerged from that tunnel of sleep deprivation, how the chaos of newborn sleep patterns blossomed into this nicely ordered set of days and nights.”
But the overarching problem is both hard to solve and important: How do you tell if there’s an actual person sitting in front of a computer screen? How do you tell that the person is paying attention, hasn’t automated his responses, and isn’t being assisted by friends? Authentication systems are big business, whether based on something you know (passwords), something you have (tokens) or something you are (biometrics). But none of those systems can secure you against someone who walks away and lets another person sit down at the keyboard, or a computer that’s infected with a Trojan.