InformationWeek Daily Archives
In This Issue:
1. Editor's Note: Oh, Behave!
2. Today's Top Story: Crime Stories
- U.S. Cell-Phone Network Vulnerable To Attack
- Update: Microsoft Details Anti-Spyware And Antivirus Software Plans
- Phishers Plant Fake Google Toolbar
- E-Criminals Go Small, Get Smarter
- New Worm-Naming Scheme Aims To Cut Confusion
3. Breaking News
- Private-Public Partnership Needed For Identity Management
- Cell-Phone Pioneer Skeptical About Google's San Francisco Wi-Fi Plans
- Check Point Acquires Sourcefire For $225 Million
- Macromedia Plans Upgrade To Flash, Flex Tools
- Wind River Offers Embedded Linux For Consumer Devices
- Mercury Announces Its First Cell Blade
- Contracts Awarded To Spur Development Of Interoperable, Secure Health IT
- AOL Adds Search Features
- Google Combines Online Maps, Local Search
- Further Delays Predicted In 802.11n Standards Fight
4. In Depth: Personal Tech & Reviews
- Review: VoIP Wireless Phones
- Sun Microsystems' StarOffice 8 Provides A Suite Alternative
- Physical Security: Axis Communications' Axis 210 Network Camera
- Review: SpyCatcher 2006 Searches Far And Wide
- A Directory Of Security-Product Reviews
- Review: Microsoft Beefs Up Windows Patch-Management Tools
- Getting A Solid ROI From Mobile Computing
5. Voice Of Authority: The Most Important Job You'll Ever Hold
6. White Papers: Top 10 Reports Every E-Mail Administrator Lives For
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"The problem with people who have no vices is that generally you can be pretty sure they're going to have some pretty annoying virtues." -- Elizabeth Taylor
The Delaware Supreme Court has ruled in favor of a group of anonymous bloggers in a defamation suit, saying in essence that free speech trumps defamation. (If that's true, there's no point to the concept of defamation.)
In his ruling, Delaware Chief Justice Myron Steele compared anonymous Internet speech to anonymous political pamphleteering, a practice the U.S. Supreme Court has apparently found to be "an honorable tradition of advocacy and dissent." (Bad choice for comparison, if you ask me, since characterizing the latter as a gutless tradition of cowardly attacks would be more accurate.) And that 1995 ruling seems contradictory. We insist on the identification of the sponsors behind political advertising--so why would pamphlets be treated any differently?
The Associated Press report also quoted Steele as saying that plaintiffs who feel wronged by anonymous online comments can use the Internet to respond to character attacks and "generally set the record straight." He also said blogs and chat rooms tend to be vehicles for people to express opinions, not facts.
That seems pretty naive to me. It's laughable to think you'd have a prayer of a rebuttal reaching even half the people who saw the initial posting, never mind the follow-up comments and other versions.
Delaware's ruling is just the latest in a series of reports that all seem to have at their core the idea that anything online, and more specific to this note, blogging, is some sort of "you can't touch this--or me" free-for-all. Nuh-uh. Blogging isn't a license for irresponsible, slanderous, or cruel behavior. If people could just manage to disagree firmly, but politely, this case wouldn't even exist. You can read more about online discourse in my blog entry.
Attackers could exploit weaknesses in text messaging to crash voice and data service on an entire cell-phone network, researchers say.
Update: Microsoft Details Anti-Spyware And Antivirus Software Plans
Timetable calls for testing new anti-spyware product for businesses by the end of this year.
Phishers Plant Fake Google Toolbar
Phishers are spreading links to the phony toolbar using IM and IRC chat.
E-Criminals Go Small, Get Smarter
Phishers are targeting smaller businesses because larger enterprises are becoming increasingly difficult to catch, a Web security firm says.
New Worm-Naming Scheme Aims To Cut Confusion
The U.S. Computer Emergency Response Team and major security vendors are looking to simplify a system that now has infections going by multiple names, each given by a different vendor.
An FBI unit chief says much needs to be done, and there's a role for everyone to help protect both business and government assets.
Cell-Phone Pioneer Skeptical About Google's San Francisco Wi-Fi Plans
Marty Cooper, who conceived of the cell phone more than 30 years ago, says that Google has grossly underestimated the number of access points needed to provide "blanket coverage" to the whole city.
Check Point Acquires Sourcefire For $225 Million
Check Point plans to integrate Sourcefire's Snort intrusion-prevention and RNA Real-time Network Awareness tools into the Check Point NGX security environment.
Macromedia Plans Upgrade To Flash, Flex Tools
The new Flash player improves performance, while Flex is an interactive development environment that had been code-named Zorn.
Wind River Offers Embedded Linux For Consumer Devices
The software is designed to be used in devices ranging from the smallest handhelds to the most robust network equipment.
Mercury Announces Its First Cell Blade
Mercury is integrating IBM's Cell processor into products designed for computationally intensive applications in aerospace and military, seismic, medical imaging, and other markets.
Contracts Awarded To Spur Development Of Interoperable, Secure Health IT
The contracts were awarded to three private-public groups that will create and evaluate processes involved with advancing the adoption of standards for features in health care IT products.
AOL Adds Search Features
America Online has released a new version of its search engine that includes, among other features, the ability to save search results.
Google Combines Online Maps, Local Search
With the move, local search tools for the United States and Canada are now officially out of beta and into general release.
Further Delays Predicted In 802.11n Standards Fight
Now that some key players have broken away from the "mainstream" process, anything could happen.
In Thursday's program:
Mastering IT Innovation
Ever wonder whether your company's IT strategy compares favorably to the nation's best-known companies? We invite you to find out with this free, informative, and confidential tool--a fast way to benchmark your company against the InformationWeek 500.
A Week's Worth Of Dailies--All In One Place
Have you missed an issue or two of the InformationWeek Daily? Or want to check out some recent quotes of the day? Check out our all-new Daily newsletter archive page and get caught up quickly.
Want the cost savings of voice over IP but don't want to be chained to your desk? These six VoIP Wi-Fi phones can help your VoIP connectivity roam right along with you.
Sun Microsystems' StarOffice 8 Provides A Suite Alternative
With most of the features for a fraction of the price, StarOffice 8 promises improvements on its already efficient office suite with Windows-like functionality.
Physical Security: Axis Communications' Axis 210 Network Camera
Axis touts the camera as an effective, motion-sensitive surveillance tool, offering a bidirectional audio option on top of video. But how effective is it, really?
Review: SpyCatcher 2006 Searches Far And Wide
Tenebril's new anti-spyware app casts a wide net in order to catch malware on your system.
A Directory Of Security-Product Reviews
From ZoneAlarm 6.0 to GhostSurf 2005, from Norton to McAfee, don't miss this laundry list of security products reviews from the TechWeb Pipelines.
Review: Microsoft Beefs Up Windows Patch-Management Tools
The release of the feature-rich Windows Server Update Services gives server administrators far more control over their update policies than its predecessor Software Update Services.
Getting A Solid ROI From Mobile Computing
Before you implement mobility projects, it's essential to understand how making enterprise applications available to mobile workers will pay off. Here are some tips.
As the first set of baby boomers reaches retirement age, as the demand for IT skills is increasing, and as the competitiveness of the United States gets called into question, it's time for this industry to promote the values of a job in IT, because no business can survive or innovate without it. Stephanie Stahl explains.
See how real-time monitoring and detailed reporting can make E-mail security management much easier and more effective for every administrator. Postini's Web console "dashboard" identifies threats and gives you E-mail insights you really shouldn't live without.
Try InformationWeek's RSS Feed
Discover all InformationWeek's sites and newsletters
To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.