Microsoft Says Longhorn Virtualization Technology On Schedule
In This Issue:
1. Editor's Note: Combating The Online Threat To Kids
2. Today's Top Story
- Microsoft Says Longhorn Virtualization Technology On Schedule
- Malware Disrupts Half Of Global Businesses, Study Finds
3. Breaking News
- Yahoo Mail Promises Unlimited Storage
- Key SAP Exec Shai Agassi Resigns
- HP Thinks Small With New Wave Of Business Computers
- New PC Security Recognizes Your Face
- Next-Generation Desktop Applications Linked To Web
- Smartphones Hit The Runway At CTIA
- Google Seeks World Of Instant Translations
- Pharma Industry Debating Bar Codes Vs. RFID For Drug Tracking
- Microsoft Releases Attack Advisory For WPAD Protocol
- Nortel, Microsoft To Expand Communications Pact
4. The Latest Google Blog Posts
- LG Shows Off Phones With Google At CTIA, But No Google Phone
- Google's Arms-Length Embrace Of Windows Vista
- The Daily Show Looks At The Viacom Lawsuit Against Google's YouTube
5. Job Listings From TechCareers
6. White Papers
- Migrating From ERwin To PowerDesigner
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"We will continue to protect the children in our communities by vigorously prosecuting individuals possessing these images." -- U.S. Attorney Scott Schools, on a former university educator sentenced to 63 months in prison for possessing more than 5,000 images of child pornography
1. Editor's Note: Combating The Online Threat To Kids
I was giving a lot of thought to the issue of protecting kids when they use computers or go online, then three news items highlighted the pervasiveness of the threat, the vileness of the predators, and the value of aggressive enforcement.
Pervasive threat: In the past couple years there's been an endless stream of lost laptops and personal data. In the United Kingdom, the National Health Services Office reports the theft of three laptops with the names, addresses, and birth dates of 11,500 kids between 8 months and 8 years old.
Tough enforcement: Florida has introduced legislation that could result in 15-year prison terms for those who distribute child pornography or deceive children in order to abuse them. That's a threefold increase over the current prison term.
What does it all mean to you?
The health care industry is prolific when it comes to personal data gathering, but I now think twice about how much information I submit, particularly when it's clear the health care organization has no need for certain pieces of data being requested. It's obviously up to parents to worry about keeping this data from getting into the wrong hands, since those gathering it are incapable of doing so. What steps have you considered or taken to limit the sharing of private information about your children? Can technology be part of the solution, rather than the problem?
The sexagenarian dirtbag's case raises the question: How can we more quickly identify, isolate, and punish those of his ilk before they do more than just gather porn?
Florida is setting a strong example of how to deal with the problem. Are there other states using the law to deter online predators or other measures being taken that will help keep kids safe?
Send me your thoughts in e-mail; I'll gather the most insightful responses and share them in the days to come.
Google Seeks World Of Instant Translations
Google's approach, called statistical machine translation, differs from past efforts in that it forgoes language experts who program grammatical rules and dictionaries into computers.
On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.
----- The latest research, polls, and tools -----
InformationWeek 500 -- Now Accepting Applications!
For nearly 20 years, InformationWeek magazine has identified and honored the nation's most innovative users of information technology with its annual InformationWeek 500 listing. This is an opportunity you can't afford to miss. Become a candidate for the 2007 InformationWeek 500 today.
Google's Arms-Length Embrace Of Windows Vista
So much is said about the rivalry between Microsoft and Google that it's easy to forget they share a common interest. Windows Vista and Google's Web-based applications will coexist on millions of computers as more people make the move to Microsoft's new operating system. That software combo had incendiary potential, but so far no alarms are sounding.
Migrating From ERwin To PowerDesigner
Tired of using the same version of ERwin year after year? Sybase PowerDesigner consistently delivers major new releases to implement effective data architecture and manage data. Plus, migrating is easy, and you may even qualify for a generous trade-in allowance on your ERwin licenses.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.