RFID or (Radio Frequency Identification) technology is all over the news nowadays due to its impending implementation to tag vehicles with microchips using RFID technology by the Land Transportation Office (LTO).
LTO said such technology would enhance registration process and will assist authorities in providing information about the vehicle. So what’s the big fuzz about the technology? Two things – cost and privacy.
I will touch the privacy issue, I will leave the cost angle to the economists.
Intel Corporation introduced its revolutionary Intel Core i7 Mobile Processor and Intel Core i7 Mobile Processor Extreme Edition, bringing Intel’s award-winning and super-fast Nehalem microarchitecture to the mobile market.
These processors in addition to the new Intel PM55 Express Chipset, provide the best laptop experience for intense gaming, digital media, photos, music, business applications and other multi-threaded software that hungers for faster processing speed. The chips also boost overall performance when using several of these applications simultaneously.
Multifunction peripheral (MFP), devices that performs a variety of functions that would otherwise be carried out by separate peripheral devices are all over. Companies who are in this field are coming out with new products that are not only efficient and environmental friendly but cost efficient as well.
A recent study made by IDC indicated that in the current economic environment, vendors are focusing on offering cost cutting and/or productivity enhancements to customer’s existing document infrastructure as well as driving managed print services.
I have been hearing the word “coopetition” for a long time. Coopetition is a portmanteu between “cooperation” and “competition”. All the while I thought this is just a word for press release. How can two companies compete and cooperate at the same time? It’s impossible I said.
But nothing is really impossible in this world.
Come September 16 and 17, 2009, I will be having my seminar entitled “TechTutor – Technology toolbox for Learners, Educators, Experts and Parents” at the SM Megatrade Hall 3. And as early as I now, I would like to thank those who already bought their tickets for the support and confidence.
In case you’re wondering why have a seminar for education, my answer is simple – I have been an educator all my life. I’ve been with the academe for years. Having been involved in universities, corporate training, public seminars and presently being part of media, I could say that a big part of my life – I have been sharing my God given technology talent to the widest audience possible.
And with the emergence of Web 2.0, the application of technology in education has never been as exciting as now. Today we can truly say that what is available to the “Have”, are now also available to the “Have Not”. The potential is clear but it’s still a long way to go.
The more innovative we get, the more crafty the threats have become. Consumers, be it corporate or personal have invested a sizeable amount of money to protect their systems – and yet we keep on hearing news about compromised systems or new threats emerging day by day.
So what are the challenges surrounding security especially now that we are into the Web 2.0 computing space?
New research from IDC shows that investments in security continue to be a priority for companies and organizations. A survey recently carried out in the region revealed that 4 out of 10 companies expect to invest more in security moving forward — more than for most other IT investment areas.
After the explosion of social networking sites like Facebook, MySpace, Multiply, Friendster and others, the Internet and its netizens were never the same again. The impact of Web 2.0 in the corporate world and personal lives of people was so tremendous that hackers are turning their attention to these sites.
The danger/threat is not a myth, they are for real but a study made by AVG and the CMO Council reveals that while the social networking community has serious concerns about the overall security of public spaces, few are taking the most basic of steps to protect themselves against online crimes.