• While McAfee's software may keep viruses from being passed between a handheld computer and corporate network, it doesn't prevent viruses from being delivered wirelessly to the PDA in the first place.

    CNN: McAfee aims to shield networks from PDA viruses

  • Microsoft is tinkering with a technology called Stuff I've Seen that will pull results from the Web along with one's own computer and its network. (Microsoft claims this won't make personal files viewable by the public.) Google's Internet Explorer toolbar tracks the sites users surf and relays the addresses back to headquarters.

    FORBES: Google Me Not

  • Teledesic is a global network that aims in late 2002 to provide Internet access, video conferencing and computer network connections through 288 low- orbiting satellites to its customers no matter where in the world they are.

    FORBES: The optimist

  • NGFWs such as those offered by Check Point, Dell SonicWALL, Juniper, Palo Alto Networks and others are extremely high-performance, turnkey appliances intended to stop threats before they reach a computer network and long before the anti-virus software on the individual computer even gets triggered.

    FORBES: Next-Generation Firewalls: What Makes Them Next-Gen

  • Yet despite their failures, the concept of network computing resonated and validated the Windows terminal, which has the advantages of a network computer and runs Windows applications.

    CNN: The future of desktop PCs

  • As Eric Schmidt said, when the back plane of your computer runs more slowly than the network, the computer hollows out and distributes itself across the network.

    FORBES: Magazine Article

  • Defense officials reported no signs of cyberattacks on its ministry's computer network and had no immediate details about the broader shutdown.

    WSJ: South Korea Banks, Media Report Possible Cyberattack

  • Perhaps we should extend Zittrain's idea beyond the computer and onto the network itself, and offer two separate logical networks, operating over the same physical connections.

    BBC: Staying safe and taking risks

  • Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication.

    FORBES: VirnetX Files Infringement Case Vs. Apple With ITC

  • Of course it is easy to prove a point if you control the definitions and I will stipulate that the idea of two nations engaging in purely network and computer based attacks would result in nothing but fodder for cyber pundits and tech journalists.

    FORBES: There is no cyber war the same way there is no nuclear war

  • While there are industries where it makes sense to allow duopolies or even monopolies to obtain economies of scale and network effects computer operating systems and electric utilities might be two examples the tradeoff usually is that they must accept closer government regulation to prevent price-gouging and other abuses.

    FORBES: If AT&T/T-Mobile Merger Would Raise Prices, Why'd Sprint Stock Jump?

  • The new systems include an online booking system, e-prescriptions and fast computer network links between NHS organisations as well as the electronic records system.

    BBC: Electronic records is one part of the ?6.8bn IT upgrade

  • It has sued dozens of companies, claiming to have patented the very idea of selling computer software and other electronic goods over a computer network.

    ECONOMIST: It was my idea

  • Once the IT infrastructure is virtualized, firms have the foundation of a shared IT infrastructure of pooled computer, network, and storage resources to delivery capacity on demand and meet fluctuations in resource requirements.

    FORBES: NetApp Was Cloud Before Cloud Was Cool, Stock Headed To $64

  • Last month, President Barack Obama signed an executive order aimed at bolstering computer-network protections, and he noted the "rapidly growing threat from cyberattacks" in his State of the Union address.

    WSJ: U.S. Official Cites Cyberattack Risks

  • As I mentioned above there is little doubt that demand is growing for those network and computer security companies as consumers and businesses both embrace things like bring your own device (BYOD), cloud and web based computing and the shift from PCs to tablets.

    FORBES: Smartphones, Tablets, The Cloud And Guns - All Growth Markets

  • While it is possible for malware protection within a computer network to do this work, the best practice is to detect and isolate a problem at the network boundary using a NGFW before it can reach the computer network.

    FORBES: Next-Generation Firewalls: What Makes Them Next-Gen

  • He was arrested in 2011 and charged in a scheme in which he allegedly logged into the computer network at the Massachusetts Institute of Technology and using it to download millions of academic journal articles from a database called JSTOR, owned by a nonprofit group.

    WSJ: Legal Case Strained Troubled Web Activist

  • Also, company computer network upgrades improved pricing and other in-store operations, which Best Buy had done long before.

    FORBES: The Copycat Plan

  • Related and supporting capabilities include computer network operations, electronic warfare, deception, operations security (OPSEC), intelligence, perception management, psychological operations (PSYOPs), and public affairs.

    FORBES: DOD Cyberspace Strategy is Too Narrow, Too Negative

  • Guido uses the case, much of which has been made public, to recreate the exploit, having students map out step by step how the hacker was able to access a desktop computer and infiltrate the company's network.

    WSJ: NYC students, hackers train for cybersecurity jobs

  • To prosecutors, the 26-year-old Swartz was a thief whose aims to make information available didn't excuse the illegal acts he was charged with: breaking into a wiring closet at the Massachusetts Institute of Technology and tapping into its computer network to download millions of paid-access scholarly articles, which he planned to share publicly.

    WSJ: MIT to release documents about activist Swartz

  • Eventually, Swartz broke into a closet in the basement of building at MIT and connected his computer directly to the network.

    FORBES: How Congress Can Create A Lasting Legacy For Aaron Swartz

  • After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period.

    ENGADGET: Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen

  • Navy and Marine Corps computer users "should leave Y2K evaluation to the network administration personnel tasked to perform that function and users are reminded that programs distributed by e-mail must be considered suspect, " the message stated.

    CNN: Navy issues warning on Y2K Trojan horse

  • Republicans insist that government funding is essential for basic science or for big projects like supercolliders, space stations, computer network security, energy programs, and nanotechnology.

    FORBES: The Debt Ceiling, Thomas Jefferson and the Semi-Virtue of a Balanced Budget Amendment

  • Rather than pour money into new hardware to expand the computer lab, he decided to invest in a new network infrastructure to support increased computer use by students, faculty and administrators.

    CNN: Florida law school uses wireless technology

  • AutEx was founded by my father, rolled out right at the dawn of the computer age in 1968, and can truly claim to be the first eCommerce business: the first computer network used to make money.

    FORBES: Bloomberg Isn't The Only Company Able To Spy On Users

  • Fincher also took a page from Benjamin Button and used computer-generated technology in The Social Network.

    FORBES: Zuckerberg Portrayal In 'The Social Network' Misses

  • Adoption has been even stronger in businesses, where corporations can replace their expensive phone networks and save money routing calls over their computer network.

    FORBES: Magazine Article

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定