In This Issue:
1. Editor's Note: Cyber Society
2. Today's Top Story: Intel Developer Forum
- Intel Math: 2+2=Quad-Core Processor
- AMD Readies Counterattack For Second Half
- Inside Intel's Core Architecture--What Makes It Better?
- Wireless USB Vs. Cable-Free USB
- Current Flash Technology Should Hold To 2010
- Free E-Book: Complete Dual-Core Diary
3. Breaking News
- Microsoft To Refresh Office 2007 Beta
- Updated: Google Agrees To Pay $90 Million In Click Fraud Suit
- Google Acquires Writely Online Word Processing Service
- PIN Scandal 'Worst Hack Ever'; Citibank Only The Start
- Microsoft Unfolds Origami, The 'On The Go' PC
- AI-Based Accoona Search Engine Aims At Google
- Vista Enterprise Meant To Spark Microsoft Licensing
- DHL Taps Several Vendors For RFID Project
- Tech Pros More 'Realistic' About Jobs In February, Survey Finds
- Books From Blogs Vie For New Literary Prize
- U Wisconsin Zaps Mac Hack Challenge
- Search Engine Meeting Will Cater To Serious Seekers
4. Grab Bag: News You Need From Around The Web
- More Is Better Serves As Theme For CeBIT (AP)
- Apple: Finding The Root Of The Problem (BusinessWeek)
- Why Data Mining Won't Stop Terror (Wired.com)
5. In Depth: Personal Tech & Reviews
- Review: Apple's MacBook Pro With Intel Core Duo Chip
- Windows Defender Anti-Spyware Beta 2: Better But Buggy
- All About Microsoft Windows SharePoint
- Review: OQO Model 01+ Windows XP Handheld
- Siemens To Offer Yahoo VoIP In Cordless Phones
- Samsung Follows Microsoft With Its Own 'Ultra-Mobile' PC
6. Voice Of Authority
- But What About The One-Man Helicopters?
7. White Papers
- Electronic Discovery Overview
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription
Quote of the day: Spring (has sprung!)
"A little madness in the spring is wholesome even for the King." -- Emily Dickinson
"[Spring is] a true reconstructionist." -- Henry Timrod
"Winter is on my head, but eternal spring is in my heart." -- Victor Hugo
1. Editor's Note: Cyber Society
As I was picking through a stack of newspapers I was getting
ready to recycle this past weekend, I kept seeing examples of how
advances in high technology and its movement beyond the workplace
are creating new opportunities for the good, the bad, and the
ever rude. It's also starting to spur debate about appropriate
applications of some of this technology, while also bringing to a
head the issue of how best to deal with some of the fallout.
The kinds of questions that come to mind include: How can we use
emerging mobile digital technology to improve how we get things
done, or even to address social problems? What's the best way to
enable people to use their technology without infringing on
anyone else's rights or interfering with other activities? These
questions keep popping up, and it's probably going to come down
to what we're willing to trade off for convenience, and what
we're willing to put up with.
For example, I saw a story not too long ago about wireless
signals from consumer applications interfering with the use of
technology at a local business. You can imagine that situation is
only going to intensify.
Here's a sampling of other ways the digital sphere is weaving
into the fabric of everyday life:
* Here's one for public safety: In Boston, authorities are urging
judges to make electronic bracelets the accessory de rigueur for
violent criminals put on probation. Of particular interest are
the repeat offenders (which begs the question of whether these
guys are the best candidates for probation, but I digress). Of
course, forcing electronic bling on high-risk, registered sex
offenders is already in practice in some areas, so it's not hard
to see Boston's push going nationwide. And it's easier still to
imagine that electronic bracelets could also be used to make sure
defendants, and perhaps even reluctant witnesses, show up at
* The modern-day Swiss Army knife isn't a knife, although that
capability will probably be added soon. It's your cell phone. You
already know its functions as a medium for pictures, video,
Internet access, and multiple forms of communication. But here
are some other emerging uses: as an alarm clock, a new form of
musical expression, and a wallet, coming soon to a ring tone near
you (for more specifics, go to my blog here).
* Hate to wait in grocery lines while the people ahead of you
corral their kids, talk on cell phones, fidget with coupons, and
rummage through their wallets and purses? Well, there may be less
of that going forward, depending on where you shop. At the very
least, you don't have to be one of those people. According to
Fortune magazine, grocery and discount stores such as
Wal-Mart and Costco are looking into letting customers pay by scanning their fingerprints.
Such systems, already in use at Albertsons, Cub Foods, and Piggly
Wiggly, will enable retailers to eliminate labor, speed up
checkout, cut processing costs, and lower transaction processing
fees. The issue of course is privacy. Do you want to leave your
fingerprints or other biometric data on file with your favorite
retailers? And can you trust them to keep that data secure?
The greater society seems to be coming down hard on beeping,
peeping cell phones--they're being banned from gyms, restaurants,
and schools, though oddly, you never read about movie theaters
banning them. However, if you can't shut your phone off or leave
it behind, not to worry. The latest trend seems to be the
creation of cell phone-friendly areas. For example, a recent
article about dining pet peeves in the Boston Globe quoted
one restaurateur as saying a trial of the concept was so
successful in its existing eateries that it will become a
standard part of blueprints for future restaurants. Look for more
restaurants and gyms to follow suit.
These are just a few examples where business technologies or
advances and our personal or societal needs have meshed and, at
times, clashed. There are many more examples, and you can read
about them by going to my blog entry.
You can also help us take a bead on how the adoption of consumer
technologies is impacting your company's IT strategies. How will
your company support these technologies in the coming years?
Share your opinions with the editors of InformationWeek by
completing our brief and confidential survey on Evolving IT Priorities. Besides, in return for your response, you could
win one of five Apple iPod Nanos valued at $199!
Vista Enterprise Meant To Spark Microsoft Licensing
A Gartner analyst says the key feature that will likely drive
most companies to adopt Windows Vista Enterprise, and thus an
enterprise software agreement with Microsoft, will be the
Multilanguage User Interface Language Pack. This will let companies
create a single distribution image that includes all languages.
DHL Taps Several Vendors For RFID Project
The initial project will integrate RFID technology into the
supply chain to improve repairs and returns. DHL wants to track
valuable items, such as high-definition television sets bound for
Books From Blogs Vie For New Literary Prize
The Blooker Prize, whose name gives a nod to the publishing
industry's prestigious Booker Prize, puts a spotlight on the
growing market of unknown writers finding a wider following for
their everyday passions and observances. Contenders include an
amateur chef and a London call girl.
U Wisconsin Zaps Mac Hack Challenge
UW-Madison yanks offline a challenge site that baited hackers to
break into a Mac Mini. The machine apparently survived 38 hours
before university administrators pulled the plug.
It's All About Access
In the coming year, many companies plan to increase employee
access to BI tools, according to a recently released
InformationWeek Research report, Business
Win An Apple iPod Nano!
How is the adoption of consumer technologies impacting your
company's IT strategies? How will your company support these
technologies in the coming years? Share your opinions with the
editors of InformationWeek by completing our brief and
confidential Evolving IT Priorities 2Q research. In return for
your response, you'll be entered into a drawing for one of five
Apple iPod Nanos valued at $199.
New Web Site! -- TECHSEARCH.COM
You can search more than 60 CMP technology sites, read blogs, and
find the best tech content from across the World Wide Web--all in
4. Grab Bag: News You Need From Around The Web
More Is Better Serves As Theme For CeBIT (AP)
Whether it's a giant flat-panel TV screen, cell phone with
enormous storage capacity, or tiny PC with full laptop functions,
visitors to the CeBIT tech fair are hit with the message that
bigger is better--even though it may come in a smaller package.
Why Data Mining Won't Stop Terror (Wired.com)
The U.S. government puts a lot of stock in the theory that
computers programmed to sift through mountains of private
consumer data can spot terrorists hidden in our midst. Too bad it
can't work. Commentary by Bruce Schneier.
Siemens To Offer Yahoo VoIP In Cordless Phones
Consumers can make free PC-to-PC calls, as well as calls to
landline phones and cellular phones, which carry a charge. In
addition, users can access their Yahoo Messenger contact list.
Samsung Follows Microsoft With Its Own 'Ultra-Mobile' PC
Microsoft wasn't the only company to launch an ultracompact PC at
the CeBIT show. Samsung Electronics said it will also be jumping
into the mobile PC market with its Q1 ultramobile PC, which is
based on a concept jointly designed by Samsung, Intel, and Microsoft.
6. Voice Of Authority
But What About The One-Man Helicopters?
Mitch Wagner thinks about the movie The Road Warrior
whenever he passes through places where business users and
students gather-coffee shops, airport gates, hotel lobbies, and
trade show common areas. In The Road Warrior, Mel Gibson
and groups of scruffy post-nuclear mutants fought for dwindling
supplies of gasoline. Similarly, wherever people gather to use
mobile computers, only the strongest survive by controlling
access to a rare, life-giving resource: working electrical sockets.
7. White Papers
Electronic Discovery Overview
Electronic discovery is preserving, acquiring, culling,
processing, reviewing, and producing electronically stored
information at issue in legal and administrative actions. The
intent of this white paper is to provide a high-level overview of
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.