HomeApplications

Applications

Lenovo Bundles StarOffice on ThinkPads

Sun Microsystems Inc. and Lenovo Group Ltd. have announced an agreement to bundle the StarOffice 8 office suite in Lenovos latest ThinkPad R51e notebook.In...

Flock Promises More Social Web Browsing

At the Web 2.0 conference in San Francisco, a California startup is set to announce on Thursday a new Web browser based on open-source...

Nematodes: The Making of Beneficial Network Worms

Convinced that businesses will use nonmalicious worms to cut down on network security costs, a high-profile security researcher is pushing ahead with a new...

Yahoo Scoops Up Social Calendar Site

Yahoo is reaching its search tentacles further into local communities, acquiring the social events site Upcoming Inc., the company revealed on Tuesday. Yahoo Inc., based...

Fake Google Toolbars Go Phishing

An Internet security specialist says a new threat forces computers to install faked Google software, which then goes phishing. Phishing is where e-mails, IM (instant...

SourceLabs Updates Community Tool

SourceLabs Inc. Wednesday announced a new release of its community-based catalog of open source projects. Cornelius Willis, vice president of Seattle-based SourceLabs, said the company...

BPM Vendor Metastorm to Acquire CommerceQuest

Business process management software developer Metastorm announced Wednesday its intent to merge with CommerceQuest Inc., which also provides BPM software, along with integration capabilities.The...

Oracle Updates PeopleSoft Enterprise Modules

Catching up on its January acquisition of PeopleSoft Corp., Oracle Corp. announced Wednesday major upgrades to the Supply Chain Management, Supplier Relationship Management and...

AOL Dials In to Net Telephony

AOL this week began selling TotalTalk, which is part of a recent wave of renewed interest in Internet telephony from AOL and its major...

Symantec Plugs High Risk AV Engine Flaw

Anti-virus specialist Symantec Corp. has confirmed a high-risk vulnerability in multiple enterprise-facing products and warned that a successful exploit could lead to code execution...