In This Issue:
1. Editor's Note: Web 2.0 And The Ajax Challenge
2. Today's Top Story:
- IDC Pegs Vista Sales At 90 Million In 2007
- Vista Will Foil Office File-Format Attacks
3. Breaking News
- Apple Patches 31 Mac OS X Bugs
- Google Questions Google Answers
- Cyber Monday Sets Online Shopping Record
- Wal-Mart Tests Movie Downloads As Its Web Site Struggles To Keep Up
- Microsoft Defends WGA Changes As 'Small Burden'
- Microsoft CFO Sees 13% To 15% Revenue Growth In FY '07
- WordPerfect To Support ODF, Office 2007 Formats
- Oracle Develops Standards For Identity Security
- HP Unveils Automated Cooling System For Data Centers
- Indiana May Turn Over Welfare System To IBM Under $1.6 Billion Outsourcing Deal
- No iPods For North Korea
- 3Com Stock Down After Huawei Deal
4. Grab Bag
- Microsoft Needs A Vista Success (BBC News)
- Analyst Predicts Vista Adoption To Trump XP (ArsTechnica)
5. In Depth: Mobility
- Strong Growth Projected For Personal Locator Services On Mobile Phones
- Verizon Wireless Could Get Boost From Video Content Deals
- Comcast Starts Offering Wireless Phone Service
6. Voice Of Authority: Video And Cell Phones
7. White Papers: Complaint Tracking
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription
Quote Of The Day:
"It shouldn't be too much of a surprise that the Internet has evolved into a force strong enough to reflect the greatest hopes and fears of those who use it. After all, it was designed to withstand nuclear war, not just the puny huffs and puffs of politicians and religious fanatics." Denise Caruso, New York Times columnist
Editor's Note: Web 2.0 And The Ajax Challenge
Web 2.0, and in particular the Ajax technology that often embodies it, has the technology world abuzz. Ajax facilitates more-interactive Web sites that deliver a better user experience. With Ajax, Web-based software makes data retrieval transparent to the user, so software behaves more like it's running locally.
But as with many fledgling technologies, the potential for the hype to get way out in front of the realityand to lead to disturbing disconnects between promised and real capabilitiesis very big with Ajax specifically and with Web 2.0 broadly. Web 2.0and how it can play into a Web site revampis the subject of an in-depth analysis today.
Since a key facet of Web 2.0 is community participation in Web sites, we'd like to get some details on your experiences with Ajax and with Web 2.0. How was the effort to develop Ajax-enabled apps? How did site visitors' experience compare and contrast with how it had been previously? Are there tangible results (i.e., better conversion rates or more sales) you can tie to the work with Ajax? Can you do the development in-house or do you need to look to third parties to support any/all Ajax initiatives? Submit your experiences at my blog entry.
We'll analyze the feedback and profile what we consider the reader experiences that exhibit the bestor the worstof Web 2.0.
IDC Pegs Vista Sales At 90 Million In 2007
The research firm predicts that 90% of PCs sold to home users next year will be powered by one of the Windows Vista Home editions, but only 35% of new business computers will be equipped with Vista Business or Vista Enterprise.
Vista Will Foil Office File-Format Attacks
Vista's Address Space Layout Randomization approach will stop some kinds of exploits, notably those that rely on memory manipulation, by arranging key data areas randomly in the available address space.
3. Breaking News
Apple Patches 31 Mac OS X Bugs
Unlike Microsoft and other vendors, Apple doesn't rank or rate the vulnerabilities it patches, but about two-thirds of the bugs could result in an attacker hijacking an unpatched Mac.
WordPerfect To Support ODF, Office 2007 Formats
By mid-2007, WordPerfect will include open, view, and edit support for the Open XML formats used by Office 2007's Word, Excel, and PowerPoint applications, as well as for ODF word processor documents.
Oracle Develops Standards For Identity Security
Software maker Oracle said Wednesday that it's developing a group of standards that businesses can use to help control and monitor the flow of sensitive personal data within corporate computer systems.
No iPods For North Korea
The Bush administration reportedly plans to strike back at North Korea's Kim Jong Il for testing nuclear missiles by denying luxuries to the leader and his political allies through trade sanctions.
Managing Privacy Issues
Learn how your peers are protecting customer data and managing privacy issues in the InformationWeek/Accenture Global Information Security survey of more than 2,000 technology and security professionals.
Satisfaction With Outsourcers
How does your outsourcer stack up? Learn how more than 400 business-technology professionals rated six of the leading outsourcers in InformationWeek Research's Analyzing The Outsourcers: Global Services report.
Analyst Predicts Vista Adoption To Trump XP (ArsTechnica)
With the upcoming public release of Windows Vista just weeks away, OEMs and computer retailers alike are anxiously awaiting the reaction to Microsoft's latest and greatest operating system release. Will the general public's response to Vista be "OMG" or just "meh"? One analyst thinks that it will definitely be the former.
Can YouTube Help Verizon Wireless' Video Business?
Next month YouTube, the popular video-sharing site recently acquired by Google, is going mobile on Verizon Wireless cell phones that use its V Cast service for on-demand video clips. YouTube will benefit from the deal by monetizing its free content, but Verizon Wireless will need to lower the price it charges for its video service if it wants more subscribers to tune in.
7. White Paper
Appraising Complaint System Effectiveness
No med-tech company enjoys receiving product complaints, but complaint tracking is an essential tool for improving performance. Your managers must assess how well their complaint-handling systems turn incident reports into formal complaints and then, as necessary, into corrective action.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.