In This Issue:
1. Editor's Note: Vegas BBQ -- Burn PC Burn
2. Today's Top Story
- Bill Could Force H-1B Employers To Fund U.S. Scholarships
- Senator Skeptical About Permanent Internet Tax Break
- Why Tech Employers Hate Congress' New Immigration Reform Bill
- Business-Consumer Coalition Calls On Congress For Universal Broadband
- No Child Left Behind Could Get Boost For Tech
3. Breaking News
- Court Ruling Impacts Liability For User-Generated Content
- Estonian Attacks Raise Concern Over Cyber 'Nuclear Winter'
- Electronics Industry Outlines Plan For National E-Recycling Program
- Google Reportedly Ready To Buy FeedBurner
- Microsoft Says It Has All It Needs For Ad Business
- Microsoft-Novell Pact Good For Novell; Is It Good For Open Source?
- The Move To Web 2.0 Increases Security Challenges
- Web 2.0: Workers See Friend, Employers See Foe
- IBM, Others Join To Develop 32-Nanometer Microprocessors
- Dell Releases Linux Desktops, Notebook
- Radiation Fears Drive Sales Of Protective Gear
- Lawsuit Claims Microsoft Xbox Sparked Fire That Killed Baby
4. The Latest Security Blog Posts
- At Interop, Security Talk Is Largely About Network Access Control
- (Missing) Without A Trace: The IBM Tapes
- The Top 10 Most Influential Security Visionaries Of All Time
- Why Do Workers Steal Data?
- More Than A Quarter Of Companies Do Not Enforce Wireless Security
5. Job Listings From TechCareers
6. White Papers
- Good Mobile Messaging
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"Part of the inhumanity of the computer is that, once it is competently programmed and working smoothly, it is completely honest." -- Isaac Asimov
1. Editor's Note: Vegas BBQ -- Burn, PC, Burn
Picture a beautiful sunset over the desert, the glow of the Vegas skyline in the distance. Then a towering wave of flames leap into the air that crackles with the heat -- a man just set his computer on fire.
And I'm not talking about a little fire. This was a 1,700-degree blaze that engulfed ioSafe's network-attached storage device with four hard drives inside.
Come on ... how many of us have had violent fantasies about setting our computers ablaze at one time or another? Well, this wasn't one of those situations, but it sure was a heck of a lot of fun to watch. And what was more interesting was that once they put the fire out and cooled the box down a bit, the ioSafe guys were able to retrieve the data that was on the hard drives inside.
No, seriously. I'm not even kidding. They put the hard drives in a new machine, fired them up (pun intended), and pulled up the information. Good as new.
I have to say it was the best damn demo I've ever seen. All the other companies hitting Interop with PowerPoint presentations and funky costumes need to rethink their marketing plans a little. The ball of fire in a vacant lot outside of a place called Screw Balls was one nice touch.
Here's the deal... ioSafe is a small company that makes disaster-proof hardware that's supposed to protect data from fire or flood. Why does this matter? As CEO Robb Moore put it, "It's the one thing you can't get insurance for to get it back. You have a fire and you can get new desks and chairs but you can't get your data back." To read more about the company, its products, and how exactly this really cool demo went down, go to my blog entry here.
On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.
----- The latest research, polls, and tools -----
Windows Vista: Meeting Expectations Or Falling Short?
Learn how more than 600 business technology professionals feel about Windows Vista and understand the deployment challenges they're facing in InformationWeek Research's Windows Vista: Meeting Expectations Or Falling Short?
InformationWeek 2007 National IT Salary Study
IT professionals are earning the highest salaries in the 10-year history of the InformationWeek National IT Salary Survey. One of the largest employee-based IT salary studies in the United States, this report documents the responses of thousands of IT professionals.
(Missing) Without A Trace: The IBM Tapes
Did you read about the missing IBM Tapes? It's almost like another undecipherable episode from "Lost," except it's a car that may have crashed in this case, apparently, and it's tapes that got lost in the aftermath.
The Top 10 Most Influential Security Visionaries Of All Time
AT&T chief security officer Ed Amoroso, speaking before a packed auditorium at his company's cybersecurity conference, wanted to test the collective knowledge of those in the room. How well-studied were they in the visionaries who've had the greatest impact on IT security? Not very well, it turns out, as few could put names to the faces projected as part of Amoroso's slide show. Amoroso was giving props to the giants on whose shoulders today's security pros stand.
Why Do Workers Steal Data?
I was fascinated by Sharon Gaudin's recent article reporting that 45% of professionals steal data when they leave their jobs. I couldn't help wondering why they do it. A desire to suck up to their new supervisors? A sense of grievance against the company that they're leaving? Or just because they can?
Good Mobile Messaging For Executives And Professional Field Forces
No longer just a luxury for top executives, mobile technology has become a necessity for field forces. This paper explains how handheld and mobile application technologies are changing the way companies and customers conduct business, and how these technologies can improve business processes in such areas as sales, service, marketing, and logistics.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.