22% Rougly one out of five users lost a mobile device in 2005
74% Three out of four corporate telephony lines will be IP-based by 2009
90% Nine out of ten major U.S. companies will test or use VoIP this year, up from 75% in 2005
$24.6B Global spending on IT security services in 2009
$81B Total server market in 2011, up from $49.8 billion in 2004
$329B Total annual online retail sales in 2010, up from $172 billion in 2005
Sources: Forrester Research
Gartner
IDC
Radicati Group
technology
News
Monday, December 26, 2005
Wednesday, December 21, 2005
gdp rise of 4.1 percent
The third quarter performance was up substantially from a 3.3 percent GDP growth rate in the April-June quarter and was the best showing since the economy expanded at a 4.3 percent rate in the first three months of 2004. The economy had originally been estimated to have grown at a 3.8 percent rate in the third quarter, a figure that was revised up to 4.3 percent last month and now revised slightly lower to 4.1 percent.
Economics
USA
Tuesday, December 20, 2005
could this picture be any more stupid?
He looks like a husband that's wanting someone to get him out of the mess he's in and she looks like she just woke up with a grand champion hangover or she is still drunk. Maybe she was drunk when this picture was taken. Maybe they just always use poor judgement.
time magazine
current events
Monday, December 19, 2005
Federal ID card rules will apply to contractors
Under a soon-to-be- issued rule in the Federal Acquisition Regulations, agencies will have to vet contractors through the same processes they put employees before issuing identification cards. The Federal Identity Credentials Committee the interim rule should be issued in the Federal Register soon. The idea is to plug a security hole. The CIO Council's IT Workforce Committee sponsored a forum in Washington, D.C. where the topic of due diligence for contractor personnel cam up for discussion.
Security
Security
Sunday, December 18, 2005
science.gov upgrades to verision 3.0
The science.gov search engine uses metadata to rank results, which should give users more accurate responses to queries. Version 3 makes searches for obscure terms easier bacause it incorporates bibliographic information into its searches. The data is ranked by using title, author, date, abstract, and other key identifiers. Users can now search in specific fields, such as date or author.
science
science
Thursday, December 15, 2005
KING KONG: Not King for an Opening Day
King Kong wasn't the king on opening day, grabbing $9.8 million from around 7,500 screens at 3,567 playdates. Director Peter Jackson's $207 million remake of the 1933 monster movie notched the 21st biggest Wednesday opening on record, significantly less than the $18.2 million start of Jackson's The Lord of the Rings: The Fellowship of the Ring.
Additionally, King Kong bowed in 36 foreign territories on Wednesday and racked up an estimated $8 million, bringing its worldwide opening day to about $17.8 million.
king kong
entertainment
Wednesday, December 14, 2005
TITAN RAIN
Reports are that Chinese Intelligence is making an effort to hack U.S. Military computer systems. The effort seems to be well organized and the attacks have been traced to the Chinese province of Guangdong. The techniques used make it appear unlikely to come from any other source than the military. Guangdong is the location of a military academy and is also believed to be the source of SARS. This operation has been code named TITAN RAIN by the U.S.
Pentagon officials confirmed earlier this year that US Defense Department websites are probed hundreds of times a day by hackers, but maintained that no classified site is known to have been penetrated by hackers. The TITAN RAIN hacking effort appears to be well organized.
News earlier this week has China overtaking the U.S. in supplying IT goods. Reports show that China's exports of information and communication technology--including laptop computers, mobile phones and digital cameras--increased by more than 46 percent to $180 billion in 2004 from a year earlier, easily outstripping for the first time United States exports of $149 billion, which grew 12 percent from 2003. China has come close to matching the United States in the overall value of its trade in information and communications technology products. China's efforts to impose its own technology standards across a range of consumer products, including mobile phones, digital photography and wireless networks, are widely interpreted as a strategy to dominate the global market for information technology goods.
This has me wondering. Are the Chinese putting devices into the equipment they are selling? Are they making their equipment "hackee friendly" and if so does the U.S. military/intelligence services have any information on what those devices could be?
china
World news
Pentagon officials confirmed earlier this year that US Defense Department websites are probed hundreds of times a day by hackers, but maintained that no classified site is known to have been penetrated by hackers. The TITAN RAIN hacking effort appears to be well organized.
News earlier this week has China overtaking the U.S. in supplying IT goods. Reports show that China's exports of information and communication technology--including laptop computers, mobile phones and digital cameras--increased by more than 46 percent to $180 billion in 2004 from a year earlier, easily outstripping for the first time United States exports of $149 billion, which grew 12 percent from 2003. China has come close to matching the United States in the overall value of its trade in information and communications technology products. China's efforts to impose its own technology standards across a range of consumer products, including mobile phones, digital photography and wireless networks, are widely interpreted as a strategy to dominate the global market for information technology goods.
This has me wondering. Are the Chinese putting devices into the equipment they are selling? Are they making their equipment "hackee friendly" and if so does the U.S. military/intelligence services have any information on what those devices could be?
china
World news
iraq war and victory strategy by bush
President Bush delivered a speech on Iraq strategy for victory today in Washington at the woodrow Wilson Center. Bush urged patience with the entire war effort. Bush has had to deliver several speeches on Iraq lately due to increased negativity from the media and Democrats on the Hill.
The media negativity has not waned since early autumn. Journalists are far more negative about the war than the American public. With elections being held and a new government in place the Iraqi situation is slowly getting stabilized. The progress factor is not what we had in mind. Afterall we wanted a swift end to Iraq, but that's not happening. The media feels unconsulted on the entire war and seems to take that out on Bush by throwing more and more negatives on their newscasts. Will this effort crack the American public shell? We shall see.
One item remains.... Bush needs good news to come from Iraq or the war on terror for his numbers to improve and allow the media to give us some positive news.
iraq
politics
Current events
The media negativity has not waned since early autumn. Journalists are far more negative about the war than the American public. With elections being held and a new government in place the Iraqi situation is slowly getting stabilized. The progress factor is not what we had in mind. Afterall we wanted a swift end to Iraq, but that's not happening. The media feels unconsulted on the entire war and seems to take that out on Bush by throwing more and more negatives on their newscasts. Will this effort crack the American public shell? We shall see.
One item remains.... Bush needs good news to come from Iraq or the war on terror for his numbers to improve and allow the media to give us some positive news.
iraq
politics
Current events
Subscribe to:
Posts (Atom)