In This Issue:
1. Editor's Note: Oh, Behave!
2. Today's Top Story: Crime Stories
- U.S. Cell-Phone Network Vulnerable To Attack
- Update: Microsoft Details Anti-Spyware And Antivirus
- Phishers Plant Fake Google Toolbar
- E-Criminals Go Small, Get Smarter
- New Worm-Naming Scheme Aims To Cut Confusion
3. Breaking News
- Private-Public Partnership Needed For Identity Management
- Cell-Phone Pioneer Skeptical About Google's San Francisco
- Check Point Acquires Sourcefire For $225 Million
- Macromedia Plans Upgrade To Flash, Flex Tools
- Wind River Offers Embedded Linux For Consumer Devices
- Mercury Announces Its First Cell Blade
- Contracts Awarded To Spur Development Of Interoperable,
Secure Health IT
- AOL Adds Search Features
- Google Combines Online Maps, Local Search
- Further Delays Predicted In 802.11n Standards Fight
4. In Depth: Personal Tech & Reviews
- Review: VoIP Wireless Phones
- Sun Microsystems' StarOffice 8 Provides A Suite Alternative
- Physical Security: Axis Communications' Axis 210 Network Camera
- Review: SpyCatcher 2006 Searches Far And Wide
- A Directory Of Security-Product Reviews
- Review: Microsoft Beefs Up Windows Patch-Management Tools
- Getting A Solid ROI From Mobile Computing
5. Voice Of Authority: The Most Important Job You'll Ever Hold
6. White Papers: Top 10 Reports Every E-Mail Administrator Lives For
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"The problem with people who have no vices is that generally you
can be pretty sure they're going to have some pretty annoying
virtues." -- Elizabeth Taylor
1. Editor's Note: Oh, Behave!
The Delaware Supreme Court has ruled in favor of a group of
anonymous bloggers in a defamation suit, saying in essence that
free speech trumps defamation. (If that's true, there's no point
to the concept of defamation.)
In his ruling, Delaware Chief Justice Myron Steele compared
anonymous Internet speech to anonymous political pamphleteering,
a practice the U.S. Supreme Court has apparently found to be "an
honorable tradition of advocacy and dissent." (Bad choice for
comparison, if you ask me, since characterizing the latter as a
gutless tradition of cowardly attacks would be more accurate.)
And that 1995 ruling seems contradictory. We insist on the
identification of the sponsors behind political advertising--so
why would pamphlets be treated any differently?
The Associated Press report also quoted Steele as saying that
plaintiffs who feel wronged by anonymous online comments can use
the Internet to respond to character attacks and "generally set
the record straight." He also said blogs and chat rooms tend to
be vehicles for people to express opinions, not facts.
That seems pretty naive to me. It's laughable to think you'd have
a prayer of a rebuttal reaching even half the people who saw the
initial posting, never mind the follow-up comments and other
Delaware's ruling is just the latest in a series of reports that
all seem to have at their core the idea that anything online, and
more specific to this note, blogging, is some sort of "you can't
touch this--or me" free-for-all. Nuh-uh. Blogging isn't a license
for irresponsible, slanderous, or cruel behavior. If people could
just manage to disagree firmly, but politely, this case wouldn't
even exist. You can read more about online discourse in my blog entry.
E-Criminals Go Small, Get Smarter
Phishers are targeting smaller businesses because larger
enterprises are becoming increasingly difficult to catch, a Web
security firm says.
New Worm-Naming Scheme Aims To Cut Confusion
The U.S. Computer Emergency Response Team and major security
vendors are looking to simplify a system that now has infections
going by multiple names, each given by a different vendor.
Mercury Announces Its First Cell Blade
Mercury is integrating IBM's Cell processor into products
designed for computationally intensive applications in aerospace
and military, seismic, medical imaging, and other markets.
Mastering IT Innovation
Ever wonder whether your company's IT strategy compares favorably
to the nation's best-known companies? We invite you to find out
with this free, informative, and confidential tool--a fast way to
benchmark your company against the InformationWeek 500.
A Week's Worth Of Dailies--All In One Place
Have you missed an issue or two of the InformationWeek Daily? Or
want to check out some recent quotes of the day? Check out our
all-new Daily newsletter archive page and get caught up quickly.
Getting A Solid ROI From Mobile Computing
Before you implement mobility projects, it's essential to
understand how making enterprise applications available to mobile
workers will pay off. Here are some tips.
As the first set of baby boomers reaches retirement age, as the
demand for IT skills is increasing, and as the competitiveness of
the United States gets called into question, it's time for this
industry to promote the values of a job in IT, because no business
can survive or innovate without it. Stephanie Stahl explains.
See how real-time monitoring and detailed reporting can make
E-mail security management much easier and more effective for
every administrator. Postini's Web console "dashboard" identifies
threats and gives you E-mail insights you really shouldn't live without.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.