Red Hat, a computer software provider, recorded 24% of losses in its earnings, because of the announcement by Oracle that it cut down its prices.
Oracle is the second biggest computer software provider in the world, and this movement is a competitive way for Red Hat.
Red Hat has been getting money from service and support to its customers. However, Oracle, the competitor of Red Hat, declared that it gives services to Red Hat’ products with half price compared with that of Red Hat.
Although Red Hat insisted the security risks for its users can be increased and compatibility can be damaged, the market price of Red Hat has been decreasing.
Jason Maynard of Credit Suisse pointed out that Red Hat’s customers have benefits that they can save their money and get well-organized services from Oracle.
Monday, October 30, 2006
Tuesday, October 24, 2006
Net Neutrality
Net Neutrality is the rule that web browser should be controlled by content or/ and application they look or use on the Internet.
Many companies, such as Google, have carried out its net business since the Internet had begun. As a result of that, a peculiar group of company can abuse content and application.
In the United States, this net neutrality is a debatable issue. Some people insist that neutrality is necessary because it will promote competitive society. The other also state that network can justify what it observes people by huge power of the Internet.
Even if the debate has not finished yet, the Congress can make a new telecommunication law to net neutrality.
It is said that once broadband companies have gotten the permission by the Congress, the shape of the online will be changed.
Many companies, such as Google, have carried out its net business since the Internet had begun. As a result of that, a peculiar group of company can abuse content and application.
In the United States, this net neutrality is a debatable issue. Some people insist that neutrality is necessary because it will promote competitive society. The other also state that network can justify what it observes people by huge power of the Internet.
Even if the debate has not finished yet, the Congress can make a new telecommunication law to net neutrality.
It is said that once broadband companies have gotten the permission by the Congress, the shape of the online will be changed.
Monday, October 16, 2006
Introduce 3 Good Web Sites
There are numerous web sites on the Internet, so you may be confused if you want to get some correct information. I introduce 3 informative web sites to you.
1, National Diet Library, Japan “ The Japanese Calendar"
http://www.ndl.go.jp/koyomi/e/
This web site shows you Japanese calendar as the title indicates. From historical point of view, the writer explains easily for non-Japanese to understand the point of Japanese calendar.
2, Eat-Japan.com
http://www.eat-japan.com/
This web site shows you not only Japanese food, but also Japanese culture. Some recipes are available, so you can challenge to make Japanese dishes.
3, Manga!!
http://www.dnp.co.jp/museum/nmp/nmp_i/articles/manga/manga1.html
This web site shows you history of Japanese comics, called Japanese manga. Recently, Japanese comics have been popular among countries, but perhaps many people focus on each work, such as Dragon Ball, but do not care about the history. Thus, this is a good chance to be familiar with it.
1, National Diet Library, Japan “ The Japanese Calendar"
http://www.ndl.go.jp/koyomi/e/
This web site shows you Japanese calendar as the title indicates. From historical point of view, the writer explains easily for non-Japanese to understand the point of Japanese calendar.
2, Eat-Japan.com
http://www.eat-japan.com/
This web site shows you not only Japanese food, but also Japanese culture. Some recipes are available, so you can challenge to make Japanese dishes.
3, Manga!!
http://www.dnp.co.jp/museum/nmp/nmp_i/articles/manga/manga1.html
This web site shows you history of Japanese comics, called Japanese manga. Recently, Japanese comics have been popular among countries, but perhaps many people focus on each work, such as Dragon Ball, but do not care about the history. Thus, this is a good chance to be familiar with it.
Monday, October 09, 2006
Computer Gifts I Would Buy for Friends & Family
I am unfamiliar with computer products, but I have heard about i-pod. i-pod is an internationally used music player, but I do not have it.
I have a two-year younger brother than I, and he has said that he has wanted a music player. Therefore, it will be better to gift i-pod to him because his birthday is coming soon. He must be pleasant for the gift, and he can enjoy his music life as soon as he will get i-pod.
To my friends, songs downloaded by the Internet can be great gifts. We can get songs by downloading with reasonable cost whenever we want. What we have to do is only to follow the directions of music web sites. Once I have got nice songs, I can send them by several methods to my friends, such as sending with e-mail.
Such computer gifts must be great for everybody!
I have a two-year younger brother than I, and he has said that he has wanted a music player. Therefore, it will be better to gift i-pod to him because his birthday is coming soon. He must be pleasant for the gift, and he can enjoy his music life as soon as he will get i-pod.
To my friends, songs downloaded by the Internet can be great gifts. We can get songs by downloading with reasonable cost whenever we want. What we have to do is only to follow the directions of music web sites. Once I have got nice songs, I can send them by several methods to my friends, such as sending with e-mail.
Such computer gifts must be great for everybody!
Monday, October 02, 2006
Social Engineering
Social engineering is that computer criminals use technique in order to abuse personal data and invade social security system by collecting them inappropriately.
One of examples of social engineering is pretexting. The purpose of this way is to get information by deceiving companies and people. Another example is phishing. By using this way, computer criminals tend to obtain information, such as passwords and credit card details.
Recently, newspapers and TV programs have been expressed social engineering, because a lof of people were deceived by computer criminals. As a result, many people are being stolen significant individual data and even money. To escape from such terrible damages, computer users must care when they type their information on the Internet so as not to give them to computer criminals.
One of examples of social engineering is pretexting. The purpose of this way is to get information by deceiving companies and people. Another example is phishing. By using this way, computer criminals tend to obtain information, such as passwords and credit card details.
Recently, newspapers and TV programs have been expressed social engineering, because a lof of people were deceived by computer criminals. As a result, many people are being stolen significant individual data and even money. To escape from such terrible damages, computer users must care when they type their information on the Internet so as not to give them to computer criminals.
Subscribe to:
Posts (Atom)