Search Details

Word: idces (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Whampoa's minority shareholders are giving Li the benefit of the doubt, despite the swirling pessimism. Indeed, management conviction seems to be the only thing that matters?and few expect Li to blink. "3G is a long-term investment for them," says Paolo Pescatore, an analyst at research firm IDC. At least until they get a better offer...

Author: /time Magazine | Title: 3G Glasses | 11/25/2002 | See Source »

...manufacturers' biggest customers - mobile operators - aren't requesting it. "No one is going to own up to this, but there is a desire and real pressure on the part of mobile operators to limit its development," says Andy Brown, a U.K.-based research manager for the technology research firm IDC. Saving customers money may not be the first priority for operators struggling with billions of dollars of debt. But the standoff is frustrating companies working on ways to allow cost-efficient roaming across different phone platforms such as Norwood Systems, and a competitor, Red-M, in Wooburn Green, England...

Author: /time Magazine | Title: Bluetooth Can't Bite | 11/3/2002 | See Source »

...turning to the ancient art of encryption, making security software one of the few growth sectors in business technology. Over the past three years, sales of encryption products have jumped 86%, to $248 million--a figure that will rise to $379 million by 2006, according to the research firm IDC...

Author: /time Magazine | Title: Beating the Snoops | 10/28/2002 | See Source »

...Today, IDC analyst Charles Kolodgy says, encryption is the "plankton" of the Internet: ubiquitous, almost invisible and indispensable. An encryption program that Netscape released for free in 1994 secured $53 billion in online commerce in the first three quarters of this year. As the Internet weaves its way into more devices, so does encryption technology. Sony's PlayStation 2 consoles include encryption software that allows gamers to communicate securely with their online playmates. TiVo television-recording systems receive encrypted software updates without the owner's even realizing...

Author: /time Magazine | Title: Beating the Snoops | 10/28/2002 | See Source »

...protecting every level of the data chain, from authenticating users to demonstrating when a communication has been tampered with in transit (a task that a sealed envelope performs with an elegant simplicity difficult to achieve in cyberspace). Though email encryption seems the most obvious use, its market, according to IDC, will probably be flat, because there are adequate options, like the program PGP (short for "pretty good privacy"), available free at web.mit.edu/network/pgp.html Instead, the main drivers of growth stand to come in the areas of database and wireless security...

Author: /time Magazine | Title: Beating the Snoops | 10/28/2002 | See Source »

First | Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | Next | Last