Recent Articles
-
How Intimate a CRM Relationship Do Your Customers Really Want?
At the very heart of any robust retail CRM system are the benefits consumers—and retailers—receive when the retailer knows as much about a customer as possible. But what happens when the customer doesn’t want such an intimate relationship? Not unlike romantic relationships, professional ones need to be based on either trust or a more calculated,…
-
Intel Intros Low-Voltage ‘Dothan’ Chips
Intel Corp. has moved its “Dothan” mobile processor into the ultra-low-voltage space, scattering additional price cuts among its mobile microprocessor lineup. Intel introduced the LV/ULV Intel Centrino 1.40GHz model 738, 1.10GHz model 733, and 1GHz model 723 alongside the platform’s corresponding Pentium M counterparts. The Centrino bundles include, in addition to the processor, an Intel…
-
SAP, Oracle Products to Aid Procurement Integration
Enterprise software developers SAP AG and Oracle Corp. are building up their respective wares to help manufacturers integrate internal design and procurement processes. The goal of each effort is for manufacturing customers to reduce the costs associated with production by creating a seamless chain of information from conception through parts sourcing and procurement. SAP, of…
-
Microsoft, Lindows Settle Trademark Dispute
Microsoft Corp. and Lindows Inc. have reached a $20 million settlement in their ongoing trademark feud, with Lindows agreeing to changes its name globally and Microsoft licensing digital media technology. The settlement, reached on Friday, ends a series of trademark infringement lawsuits that Microsoft had brought against Lindows in which it alleged that the Lindows…
-
New Phishing Technique Works on Multiple Browsers
A British Web developer has revealed a new form of a cross-site scripting, or XSS, attack that facilitates phishing activities. The attack, demonstrated by the developer on his own site, allows an attacker to execute scripts in the context of another Web site. Testing by eWEEK.com indicates that the attack works on both Internet Explorer…