Other
Commentary
10/7/2005
05:34 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Oh, Behave!

In This Issue:
1. Editor's Note: Oh, Behave!
2. Today's Top Story: Crime Stories
    - U.S. Cell-Phone Network Vulnerable To Attack
    Related Stories:
    - Update: Microsoft Details Anti-Spyware And Antivirus Software Plans
    - Phishers Plant Fake Google Toolbar
    - E-Criminals Go Small, Get Smarter
    - New Worm-Naming Scheme Aims To Cut Confusion
3. Breaking News
    - Private-Public Partnership Needed For Identity Management
    - Cell-Phone Pioneer Skeptical About Google's San Francisco Wi-Fi Plans
    - Check Point Acquires Sourcefire For $225 Million
    - Macromedia Plans Upgrade To Flash, Flex Tools
    - Wind River Offers Embedded Linux For Consumer Devices
    - Mercury Announces Its First Cell Blade
    - Contracts Awarded To Spur Development Of Interoperable, Secure Health IT
    - AOL Adds Search Features
    - Google Combines Online Maps, Local Search
    - Further Delays Predicted In 802.11n Standards Fight
4. In Depth: Personal Tech & Reviews
    - Review: VoIP Wireless Phones
    - Sun Microsystems' StarOffice 8 Provides A Suite Alternative
    - Physical Security: Axis Communications' Axis 210 Network Camera
    - Review: SpyCatcher 2006 Searches Far And Wide
    - A Directory Of Security-Product Reviews
    - Review: Microsoft Beefs Up Windows Patch-Management Tools
    - Getting A Solid ROI From Mobile Computing
5. Voice Of Authority: The Most Important Job You'll Ever Hold
6. White Papers: Top 10 Reports Every E-Mail Administrator Lives For
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription

Quote of the day:
"The problem with people who have no vices is that generally you can be pretty sure they're going to have some pretty annoying virtues." -- Elizabeth Taylor


1. Editor's Note: Oh, Behave!

The Delaware Supreme Court has ruled in favor of a group of anonymous bloggers in a defamation suit, saying in essence that free speech trumps defamation. (If that's true, there's no point to the concept of defamation.)

In his ruling, Delaware Chief Justice Myron Steele compared anonymous Internet speech to anonymous political pamphleteering, a practice the U.S. Supreme Court has apparently found to be "an honorable tradition of advocacy and dissent." (Bad choice for comparison, if you ask me, since characterizing the latter as a gutless tradition of cowardly attacks would be more accurate.) And that 1995 ruling seems contradictory. We insist on the identification of the sponsors behind political advertising--so why would pamphlets be treated any differently?

The Associated Press report also quoted Steele as saying that plaintiffs who feel wronged by anonymous online comments can use the Internet to respond to character attacks and "generally set the record straight." He also said blogs and chat rooms tend to be vehicles for people to express opinions, not facts.

That seems pretty naive to me. It's laughable to think you'd have a prayer of a rebuttal reaching even half the people who saw the initial posting, never mind the follow-up comments and other versions.

Delaware's ruling is just the latest in a series of reports that all seem to have at their core the idea that anything online, and more specific to this note, blogging, is some sort of "you can't touch this--or me" free-for-all. Nuh-uh. Blogging isn't a license for irresponsible, slanderous, or cruel behavior. If people could just manage to disagree firmly, but politely, this case wouldn't even exist. You can read more about online discourse in my blog entry.

Patricia Keefe
pkeefe@cmp.com
www.informationweek.com


2. Today's Top Story

U.S. Cell-Phone Network Vulnerable To Attack
Attackers could exploit weaknesses in text messaging to crash voice and data service on an entire cell-phone network, researchers say.

Related Stories:
Update: Microsoft Details Anti-Spyware And Antivirus Software Plans

Timetable calls for testing new anti-spyware product for businesses by the end of this year.

Phishers Plant Fake Google Toolbar
Phishers are spreading links to the phony toolbar using IM and IRC chat.

E-Criminals Go Small, Get Smarter
Phishers are targeting smaller businesses because larger enterprises are becoming increasingly difficult to catch, a Web security firm says.

New Worm-Naming Scheme Aims To Cut Confusion
The U.S. Computer Emergency Response Team and major security vendors are looking to simplify a system that now has infections going by multiple names, each given by a different vendor.


3. Breaking News

Private-Public Partnership Needed For Identity Management
An FBI unit chief says much needs to be done, and there's a role for everyone to help protect both business and government assets.

Cell-Phone Pioneer Skeptical About Google's San Francisco Wi-Fi Plans
Marty Cooper, who conceived of the cell phone more than 30 years ago, says that Google has grossly underestimated the number of access points needed to provide "blanket coverage" to the whole city.

Check Point Acquires Sourcefire For $225 Million
Check Point plans to integrate Sourcefire's Snort intrusion-prevention and RNA Real-time Network Awareness tools into the Check Point NGX security environment.

Macromedia Plans Upgrade To Flash, Flex Tools
The new Flash player improves performance, while Flex is an interactive development environment that had been code-named Zorn.

Wind River Offers Embedded Linux For Consumer Devices
The software is designed to be used in devices ranging from the smallest handhelds to the most robust network equipment.

Mercury Announces Its First Cell Blade
Mercury is integrating IBM's Cell processor into products designed for computationally intensive applications in aerospace and military, seismic, medical imaging, and other markets.

Contracts Awarded To Spur Development Of Interoperable, Secure Health IT
The contracts were awarded to three private-public groups that will create and evaluate processes involved with advancing the adoption of standards for features in health care IT products.

AOL Adds Search Features
America Online has released a new version of its search engine that includes, among other features, the ability to save search results.

Google Combines Online Maps, Local Search
With the move, local search tools for the United States and Canada are now officially out of beta and into general release.

Further Delays Predicted In 802.11n Standards Fight
Now that some key players have broken away from the "mainstream" process, anything could happen.

All our latest news

Watch The News Show

In Thursday's program:

John Soat with the "Media Minute"

Aaron Ricadela with "Web, Too"

Ivan Schneider with "Grid Is Good"

Bob Evans with "Chinese Food For Thought"


----- The latest research, polls, and tools -----

Mastering IT Innovation
Ever wonder whether your company's IT strategy compares favorably to the nation's best-known companies? We invite you to find out with this free, informative, and confidential tool--a fast way to benchmark your company against the InformationWeek 500.

A Week's Worth Of Dailies--All In One Place
Have you missed an issue or two of the InformationWeek Daily? Or want to check out some recent quotes of the day? Check out our all-new Daily newsletter archive page and get caught up quickly.

-----------------------------------------


4. In Depth: Personal Tech & Reviews

Review: VoIP Wireless Phones
Want the cost savings of voice over IP but don't want to be chained to your desk? These six VoIP Wi-Fi phones can help your VoIP connectivity roam right along with you.

Sun Microsystems' StarOffice 8 Provides A Suite Alternative
With most of the features for a fraction of the price, StarOffice 8 promises improvements on its already efficient office suite with Windows-like functionality.

Physical Security: Axis Communications' Axis 210 Network Camera
Axis touts the camera as an effective, motion-sensitive surveillance tool, offering a bidirectional audio option on top of video. But how effective is it, really?

Review: SpyCatcher 2006 Searches Far And Wide
Tenebril's new anti-spyware app casts a wide net in order to catch malware on your system.

A Directory Of Security-Product Reviews
From ZoneAlarm 6.0 to GhostSurf 2005, from Norton to McAfee, don't miss this laundry list of security products reviews from the TechWeb Pipelines.

Review: Microsoft Beefs Up Windows Patch-Management Tools
The release of the feature-rich Windows Server Update Services gives server administrators far more control over their update policies than its predecessor Software Update Services.

Getting A Solid ROI From Mobile Computing
Before you implement mobility projects, it's essential to understand how making enterprise applications available to mobile workers will pay off. Here are some tips.


5. Voice Of Authority

Editor's Note: The Most Important Job You'll Ever Hold
As the first set of baby boomers reaches retirement age, as the demand for IT skills is increasing, and as the competitiveness of the United States gets called into question, it's time for this industry to promote the values of a job in IT, because no business can survive or innovate without it. Stephanie Stahl explains.


6. White Papers

Top 10 Reports Every E-Mail Administrator Lives For
See how real-time monitoring and detailed reporting can make E-mail security management much easier and more effective for every administrator. Postini's Web console "dashboard" identifies threats and gives you E-mail insights you really shouldn't live without.


7. Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.


8. Manage Your Newsletter Subscription

To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.

We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2005 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest September 18, 2014
Enterprise social network success starts and ends with integration. Here's how to finally make collaboration click.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
The weekly wrap-up of the top stories from InformationWeek.com this week.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.