17 Results for



Ghost invades Peaches Geldof's selfie?

Nothing sets apart an Instagram image like a photobombing spirit. But is it the work of a haunting or a photo app?

By December 16, 2013


Does fixing Microsoft mean ending Microsoft as we know it?

First, choose Steve Ballmer's replacement for the CEO's hot seat. Then comes the really hard part.

By November 14, 2013


How new tech standards wind up stillborn

Appearance of the "Open Cloud Manifesto" immediately runs into a snag as Amazon and Microsoft opt out. What's needed now is the intervention of cooler heads who can rise above the fray to figure out how to heal the rift before it widens.

By March 27, 2009


Five ways Netflix still needs to improve itself

Netflix's new pricing plan is problematic to some, but there are other issues with Netflix, too. Fix these, and maybe we'd pay more money.

By July 14, 2011


Sony's Qriocity aims to put Connect, iTunes behind

On the music front, Sony long ago ruled with the Walkman, and stumbled badly with its Connect service. Can it reclaim lost glory by relying on the cloud and its PlayStation network?

By February 17, 2011


Three challenges for 3D TV

It's been promised as "the next big thing" since the advent of color TV. But is there really any consumer demand for 3D television?

By January 4, 2010


Another wireless HDMI casualty: Belkin cancels FlyWire

Long awaited and oft-delayed, the FlyWire wireless HDMI accessory will now never see the light of day.

By July 16, 2009


Will tablets be a tweener?

Could an "e-book reader on steroids" become a mainstream device intermediate between a smartphone and a notebook?

By May 13, 2009


What we learned from Open Cloud Manifestogate

The Open Cloud Manifesto leaks of the last two days--and the furor they have caused--make it very clear that standards will never be the same again.

By March 28, 2009


Researching notebooks for medical research

Research study planned by University of Michigan doctor raises interesting questions about Netbooks, broadband Internet access, and physical computer security.

By February 2, 2009