In This Issue:
1. Editor's Note: Eaten By The E-Mail Monster
2. Today's Top Story
- IBM Bolsters Services Automation With $1.3 Billion Buyout Of Internet Security Systems
- Analysis: IBM Deal With ISS Means Trouble For Check Point, McAfee
- BEA Acquires Flashline, Expands SOA Capabilities
3. Breaking News
- Brief: Apple Fires Five For Downloading Leopard OS
- Feds Clear Some Apple MacBook Pro Batteries Of Safety Defects
- Sophos Delivers Free Rootkit Sniffer For Windows
- Review: Is Google Still The Ajax King?
- Big Boost In Zombie PCs Seen From Latest Windows Exploit
- FTC Task Force To Tackle Net Neutrality
- Bush Executive Order Unlikely To Pump Much Life Into Health IT
- Intel Conroe Processors Move To Servers
- Yahoo Adds Anti-Phishing Sign-In Seal
- eMachines Founder Wants It Back, Offers $450 Million
- Brief: EarthLink Adds Anonymous E-Mailing For Subscribers
- IEEE-USA Seeks Crackdown On H-1B Abuses
- MySpace Pioneer Seeks More Success In China
- Google Gives Open Access To Japan Version Of Gmail
4. Grab Bag
- Researchers Yearn To Use AOL Logs, But They Hesitate (The New York Times)
- 10 Tips For New Ubuntu Users (Linux.com)
- How To Talk Like An Iraqi (Technology Review)
5. In Depth
- Microsoft Nixes IE Repatch, Chides Researcher
- Microsoft Warns Against Adding More Servers To Outgoing Windows Update App
- Microsoft Exec: Unified Communications Tools On Tap
- Microsoft Lands Ad Deal With Facebook
- Brief: Microsoft Will Meet Korean Windows XP Deadline
6. Voice Of Authority
- Quick Tip For Firefox Users: Deleting Incorrect Auto-Complete Entries
7. White Papers
- More And More Companies Are Reaping The Rewards Of IT And Software Asset Management
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription
Quote of the day:
"1. Never tell everything at once." -- Ken Venturi
1. Editor's Note: Eaten By The E-Mail Monster
E-mail has gotten to be downright impossible. It causes so many problemslost productivity, infrastructure costs, legal liabilitythat we should just get rid of it. It's a waste of time and resources, and it's just likely to get us all sued.
And yet, we can't afford to get rid of it. It's what we use to stay in touch. If we didn't have e-mail, we'd be isolated from business communications.
Like the old barroom saying goes: Can't live with it. Can't live without it.
The most visible problem is the time spent by individual workers reading and managing e-mail. A typical office worker gets 100 to 300 or more messages every day.
But that's just the beginning of the problem; Paul and Elena describe how AIM Healthcare, Penske Truck Leasing, and other companies are struggling with the burden of supporting thousands of e-mail users.
Paul and Elena also describe some well-known e-mail fiascoes: "There's the embarrassing case of Boeing CEO Harry Stonecipher, axed last year after e-mails revealed an affair with a female executive at the company. Or Frank Quattrone, the former Credit Suisse banker who was barred in 2004 from the securities industry after e-mail revealed he tried to cover up his dubious investment practices. Morgan Stanley, fined millions of dollars for its inability to manage e-mail in compliance with Securities and Exchange Commission orders, is now tied up in a $10 million lawsuit filed by a former Morgan Stanley IT exec who claims he was fired for, among other things, discovering unethical e-mails from other execs in the company's bloated archive."
E-mail requires huge infrastructure costs: bandwidth, servers, and staff to support it. E-mail needs to be screened for spam and viruses, and, even with that screening, e-mail is still a sewer of security problems: Spanish prisoner rackets, pump-and-dump stock come-ons, bank fraud, and other scams that used to be practiced in saloons now take place online. TechWeb writer Gregg Keizer has some tips on e-mail security.
And e-mail needs to be archived. Regulations require it. E-mail messages have become a routine part of the legal discovery process; 21% of companies received subpoenas for e-mail and instant message records, according to a study conducted two years ago by the American Management Association and ePolicy Institute.
Sophos Delivers Free Rootkit Sniffer For Windows
Microsoft estimates that 14% of computers owned by users of its Malicious Software Removal Tool harbor a rootkit. Sophos warns that rootkits are being used by hackers to hide a variety of criminal activities.
Review: Is Google Still The Ajax King?
Google has taken a decisive lead in creative Ajax-based applications, but challengers abound. We review 20 other online apps to see how they stack up against Google's offerings.
FTC Task Force To Tackle Net Neutrality
The head of the Federal Trade Commission said this week that her agency is studying the issue more in depth and that industrywide regulatory schemes shouldn't be imposed without a cost-benefit analysis and consideration of whether another less-broad approach could be a better way to address potential harm.
Intel Conroe Processors Move To Servers
The CPU will effectively replace current Pentium D processors, which some system makersincluding Dell and IBMhave been using to power entry-level servers for small businesses.
Yahoo Adds Anti-Phishing Sign-In Seal
The seal is associated with the person's computer instead of an ID and password. That's because Yahoo believes it's better to show subscribers they're visiting a legitimate page before entering any personal information.
IEEE-USA Seeks Crackdown On H-1B Abuses
The group wants the government to give the Labor Department the authority to investigate complaints and to enact an auditing program to make sure foreign workers aren't exploited.
Download PDFs Of InformationWeek's Top Stories
Visit InformationWeek Downloads to get all of InformationWeek's biggest, best articles all in one place, in an easy-to-read PDF format, to help you analyze and make purchase decisions for today's technology solutions.
Subscribe To Your Favorite Authors
Are you a fan of Fred Langa? Are there other InformationWeek authors that you view as must-reads? Then check out our authors directory; each author has his or her own page and RSS feed.
10 Tips For New Ubuntu Users (Linux.com)
Ubuntu has become the most popular Linux distribution for new Linux users. It's easy to install, easy to use, and usually "just works." But moving to a different operating system can be confusing, no matter how well-designed it is. Here's a list of tips that might save you some time while you're getting used to Ubuntu.
Microsoft Nixes IE Repatch, Chides Researcher
The company has decided to hold off on issuing a revised MS06-042 patch because of some technical issues, but it's blasting a security researcher for what it calls "irresponsible" disclosure of the severity of the bug. That researcher, in turn, is accusing Microsoft of "lying" to IT shops and pointing the way to the exploit.
Microsoft Exec: Unified Communications Tools On Tap
Microsoft plans to roll out next year a slew of unified communications products, including unified messaging, IP call management, soft phones and IP phones, audio and videoconferencing, immersive meetings, and a unified communications platform, a company executive said at a conference this week.
Quick Tip For Firefox Users: Deleting Incorrect Auto-Complete Entries
Eric Hall says: One of the nicest things about modern browsers is that they can "remember" the text strings you type into certain kinds of Web-based forms. On the downside, they also remember your mistakes and typos, and sometimes this results in incorrect values being reused. My mission over the weekend: Find a way to get rid of the old values, without nuking the whole cache.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.