Famous Quotes and Proverbs
If you are looking for famous quotes and proverbs, you've come to the right place! Browse our largest database, which contains over 150,000 quotations, proverbs and sayings by the most renowned poets, artists, authors, inventors and researchers both living and deceased. Use our famous quotes and proverbs to support the content of your essay, term paper, research paper or dissertation. Be inspired by our quotes, proverbs and sayings now!
Search our collection by author, topic or keyword. It's completely FREE!
Browse Authors:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
(Click a letter to view the authors)
(Click a letter to view the authors)
Letter "K" » Ken Dulaney Quotes
«They offer something Palm can't offer -- a broad, strong set of development tools to write custom apps and a large choice of hardware,»
Author: Ken Dulaney
«You've built this great firewall in front of your enterprise, but the back of your enterprise is like Swiss cheese,»
Author: Ken Dulaney
«For 3Com to take on Microsoft and all the other players would be suicide in my opinion,»
Author: Ken Dulaney
«We've had such a good wired infrastructure here that using a cell phone to do things probably kind of lets you down if you're used to a rich Internet experience and you're getting 1Mbps to the house over the Internet and then you go to a four-line-by-20-character [sized] phone and try to do Internet,»
Author: Ken Dulaney
«What you really want your phone to do is to alert you to things, ... So you tell the back-end systems what you're interested in, and then these back-end systems will watch for you and tell you when things get kind of out of kilter.»
Author: Ken Dulaney
«I'd say there's no business interest in wireless video today, ... Ask yourself why no one uses those little pocket TVs. Not enough people like it.»
Author: Ken Dulaney
«Because infrared has so little security when someone beams you their business card, there's no way to know what you're getting, ... Bluetooth [another short-range wireless data exchange protocol] has access permission security, but once you permit access, it's a hacker's delight.»
Author: Ken Dulaney
«Bluetooth is just now passing over the peak of inflated expectations,»
Author: Ken Dulaney
«Unfortunately, the only way to really secure a PDA is the lock it into a vault.»
Author: Ken Dulaney
«Hackers could infect your system or network with software that uses the PDA as a Trojan horse to get into the enterprise,»
Author: Ken Dulaney
Research our database of free Biographies. Sign-up for the database of college sample papers for only $14.95/month. Buy a custom written essay, term paper, research paper or dissertation on any topic and get a discount!