In This Issue:
1. Editor's Note: China's Security Syndrome
2. Today's Top Story
- Apple Ties For Third In U.S. PC Market
3. Breaking News
- FBI Analyst Sentenced To 10 Years For Stealing National Secrets
- Notebooks Bursting Into Flames Again
- Claims Of A Mac Worm Incite Blogging Brawl
- Oracle Adds Google Maps To Field Service Software
- Outreach Programs Help Pump Up Tech Degree Enrollment At UMBC
- McAfee's DeWalt Pushes For Legislation To Battle Cybercriminals
- Verizon Wireless Keeps Adding To Its Retail Customer Base
- IT Careers: New Master's Degree Emphasizes Ethical Hacking
- Lower Handset Sales Hit Motorola's Second-Quarter Earnings
- Sprint, Clearwire Confirm Partnership On WiMax
- Will Safari Make iPhone The Smartphone Of Choice In Business?
- The Dollars And Sense Of Virtual Data Centers
- SunRocket Subscribers Find Alternative Service, But Number Porting Is Slow
- Spammers Exploit Brazilian Plane Crash
- Microsoft Hit With A Second Xbox 360 Class-Action Suit
- Microsoft Faces Petition To Defeat Office 2007 Standard
- BEA Launches Web 2.0-Style Computing Inside The Enterprise
4. The Latest Personal Tech Blog Posts
- Needleworkers Knit iPhone, Nintendo, And Sew Full-Sized Ferrari
- Book Review: IT Manager Battles The Undead In 'The Atrocity Archive'
- Why Do You Need Third-Party Software Just To Turn Off Your iMac Display?
- Overseas Cell Phone Users: More Numerous -- And More Courteous
- Intel Intros Core 2 Extreme QX6850 As Price War Looms
5. Job Listings From TechCareers
6. White Papers
- Eight Challenges Of Information Privacy And Security Law Facing The Fax Industry
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"Play: Work that you enjoy doing for nothing." -- Evan Esar
1. Editor's Note: China's Security Syndrome
InformationWeek Research's 10th annual Global Information Security Survey highlights some very different security concerns facing Chinese businesses as opposed to their U.S. counterparts.
While U.S. businesses are generally considered to have a mature and stable corporate environment that's been grappling with IT security issues for years, China's more recent movement to the global business arena means the country is just beginning to pay attention to a lot of IT security concerns.
Chinese companies are generally three to five years behind North American and U.K. companies in terms of IT security, Alastair MacWillson, managing director of Accenture's global security practice, told me. Accenture helped InformationWeek Research put together the survey, and MacWillson shares his expertise in a story titled "China's Evolutionary Leap." "Security hasn't typically been fantastically high on their priority list."
Chinese businesses have a lot of catching up to do, which might explain why the average percentage of IT budget spent on information security is a whopping 19% in China, as compared with 12% in the United States. "That's quite an astonishing figure," MacWillson says, adding that the Chinese companies that responded to the survey clearly understand that China is far behind in terms of IT security and are spending to catch up to where they need to be.
The Dollars And Sense Of Virtual Data Centers
To manage server sprawl, exponential data growth, power consumption, and nearly unmanageable infrastructures, many IT organizations are turning to data center virtualization and blade-server technologies. But careful consideration is needed.
On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.
----- The latest research, polls, and tools -----
Information Security: The Complexity Issue
Managing security complexity is a global business issue. From
threat management and risk response to compliance and data
privacy, find security solutions that enable high performance in
this special podcast series.
Managing Security Complexity
Managing information security is growing in complexity in
response to more types of and more frequent attacks. Examine how
more than 3,000 technology and security professionals are
managing this complexity and protecting mission-critical systems
in the 10th annual Global Information Security survey, a joint
research project between InformationWeek Research and Accenture.
Windows Vista: Meeting Expectations Or Falling Short?
While security enhancements top the list of reasons companies are
installing Windows Vista, concerns about compatibility and costs
are driving the less-than-stellar adoption rates. Learn how more
than 600 business technology professionals responded to these
questions and more in InformationWeek Research's Windows Vista:
Meeting Expectations Or Falling Short?
Book Review: IT Manager Battles The Undead In The Atrocity Archive
You don't have many IT-manager action heroes in science fiction. Sure, you have a lot of hackers, breaking into networks and subverting authority. But not a lot of science-fiction heroes save the universe in between staff meetings, working the help desk, and rebooting the file server.
Why Do You Need Third-Party Software Just To Turn Off Your iMac Display?
Turning down or off the display isn't just a matter of saving energy for Mother Earth. It is also necessary to produce a condition known to interior designers as "darkness." And the iMac, for some reason, lacks that most simple of hardware amenities: an on-off switch that controls just the display.
Overseas Cell Phone Users: More Numerous -- And More Courteous
Sitting in a London theater last week waiting for the curtain to rise, we were startled to hear the loudest cell phone ring tone we'd ever heard broadcast over the theater's loudspeaker -- quickly followed by another, then another, then another until there was a virtual cacophony of conflicting bells, whistles, snippets of Europop and Beethoven echoing through the hall.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.