To receive this or other Digital Media Net industry leading newsletters, please click here to subscribe.
To advertise on this newsletter, please contact our sales representative.
If you are having problems linking to the stories please click here to go to the online version of this newsletter.
To Unsubscribe from the newsletter, click here
Date: 2006-10-25
Technology News:
Company News:
AMD Completes ATI Buy, Unveils Fusion Initiative
AMD to create a new breed of x86 processors that integrate the central processing unit (CPU) and graphics processing unit (GPU) at the silicon level
(Electronic News) _ AMD today announced the completion of its approximately $5.4 billion acquisition of ATI Technologies Inc., a deal that sees the second-place MPU maker gain the industry's second-place graphics chipmaker.

Content Insider #69
Shrinking Storage?Keeping Data Safe, Close At Hand
The lowely overworked and unappreciated hard drive recently observed its 50th anniversary. It has steadily grown in capacity, shrunk in size and spawned offspring that have sworn they will bury their parent. Local and personal storage continues to thrive and survive. Why? Ask Ben Franklin... ?Distrust and caution are the parents of security, Benjamin Franklin

The Merger Point Between Business and IT
Developing trust and communication is key to a smoothly running machine
In the late ?90s companies actively recognized that Information Technology, or IT, is a competitive differentiator. This set in motion, however, a collision of factions between both IT and the business. Who really runs the company? In this article I will explain where the merger point between business and IT is.

Malicious Code Injection
It?s Not Just for SQL Anymore
More and more, developers are becoming aware of the threats posed by malicious code, and SQL injection in particular, and by leaving code vulnerable to such attacks. However, while SQL is the most popular type of code injection attack, there are several others that can be just as dangerous to your applications and your data, including LDAP injection and XPath injection. While these may not be as well-known to developers, they are already in the hands of hackers, and they should be of concern.

Does Microsoft Office 2007 Matter?
Competition comes knocking
For the last 15 years there has been a stable of tools IT professionals can rely on: Microsoft Outlook, Word, Excel and PowerPoint. Along the way new tools have been added, such as Microsoft Project and Visio to the Microsoft Office suite During this time corporations and individuals have forked over billions of dollars in licensing to Microsoft to run these tools. But, the one constant in the world change is knocking at Microsofts door with a little message from Google.


Advertising Information
Send email to:
DMO Sales


Coyright, 2006 Digital Media Online, All Rights Reserved