In This Issue: Business At Light Speed
1. Editor's Note: Data Dumpster Diving, Anyone?
2. Today's Top Story
- Business At Light Speed
- In Pursuit Of Optimum Speed
- All The News A Machine Can Use
3. Breaking News
- Privacy Groups Decry Google's Plans For DoubleClick
- Government Agencies Wide Open To Attack
- Apple Megapatch Fixes 25 Vulnerabilities
- Google Buys Videoconferencing Software
- Lawmakers Launch Move To Overhaul Patent System
- AMD Nearly Out Of Cash, Says Analyst
- Microsoft Releases Betas Of New Visual Studio, .Net Framework
- IBM Wins Swiss Bank Deal Worth $460 Million
- Windows XP Redux: Dell Revives Predecessor To Vista
- Circuit City, Napster To Offer Joint Music Service
- Most U.S. Workers Don't Use Vacation Time, Study Shows
- HP, Sun, Accenture Accused Of Offering Kickbacks In Gov. Contracts
4. The Latest Digital Life Blog Posts
- The Year 2000 As Predicted In 1900
- Apple May Subsidize iPhone: Another Sign The iPhone Is In Trouble?
- Freedom Of Speech And Civil Discourse -- Are They Mutually Exclusive?
- Why We're Devoting So Much Coverage To Second Life
- Weighing In On Wal-Mart's Fluid Scheduling
5. Job Listings From TechCareers
6. White Papers
- Turn Virtual Management Into Automated Best Practices
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"In theory, there is no difference between theory and practice; in practice, there is." -- Chuck Reid
1. Editor's Note: Data Dumpster Diving, Anyone?
Do you know where your paper customer records are? Better yet, does the state attorney general's office know? As both RadioShackand CVS/Caremark Corp. have found out this year, being in control of the former situation is so much better than ceding control in the latter.
Both companies -- most recently CVS/Caremark -- are facing potential lawsuits, costly fines, and negative publicity after Texas authorities discovered that customer records had been improperly, illegally -- and just plain incredibly -- dumped into the trash behind one of their stores. In the case of CVS, the dumped data is said to have included hundreds of active debit and credit card numbers, complete with expiration dates.
It only took the actions of one store in each chain to trigger an embarrassing mess. In each case, store employees violated company policy. You might think that today, only someone living under a rock would be unacquainted with the perils of identity theft and that most people -- certainly your employees -- would have a grasp of at least the rudimentary ways in which identity theft can be abetted and avoided. Even if these workers hadn't read the company data retention and privacy policies, surely they've heard of shredders?
In any case, the lesson here for corporate America, its security czars, and IT departments, is both clear and simple: People are the weakest link in your security armor, and education has never been more crucial. After all, who needs Trojans, stealth code, stolen passwords, and encryption keys when you can count on one blockhead to just hand over a mountain of data on a silver platter?
Google Buys Videoconferencing Software
While Google indicated that the software would be used to facilitate internal meetings, it eventually may be integrated into services like Google Talk or Google Docs & Spreadsheets.
Lawmakers Launch Move To Overhaul Patent System
The bill, backed by many software and technology companies, would give parties more leeway to question the validity of patents before and after they are granted by the U.S. Patent and Trademark Office.
AMD Nearly Out Of Cash, Says Analyst
Following a horrible quarter and market share losses, Advanced Micro Devices is within two quarters of running out of cash, according to an analyst.
Enhanced Data Protection For SMBs: Leveraging Online Backup
An InformationWeek and Network Computing Vendor Perspectives Webcast
Join us for a timely, interactive presentation to find out how remote, online backup and recovery can help SMBs meet and overcome their data protection challenges. Experts from Arsenal Digital Solutions will explore:
Implementing a full backup solution while minimizing capital expenditures
Developing the business case for backup and business continuity programs
Automating backup and recovery activities company-wide
Date: Thursday, April 26
Time: 9 a.m. PDT/noon EDT
Apple May Subsidize iPhone: Another Sign The iPhone Is In Trouble?
One analyst claims that Apple is seriously considering a subsidy strategy for the iPhone. This is completely the opposite of what Apple planned to do when it launched the iPhone in January. Could this be yet another sign that Apple is scrambling to save the iPhone?
Why We're Devoting So Much Coverage To Second Life
I've been exchanging some e-mail with a reader who thinks we're
crazy for devoting so much space to Second Life. He's not the
only one -- many critics think the media in general devotes too
much space to Second Life. You don't have to look very far to
find that attitude.
Weighing In On Wal-Mart's Fluid Scheduling
I'm in desperate need of some self-image enhancement therapy
after reading some of the feedback from my piece about Wal-Mart
and its implementation of workforce-scheduling software and my
assertion that while some employees will have to adapt to new
work schedules that can be fluid or even unpredictable, it's
nevertheless an excellent business move by Wal-Mart because it
will lead to greater customer value by pegging workforce
deployment to store traffic.
Turn Virtual Management Into Automated Best Practices
Virtualization adds management overhead, which increases the time and staff required to manage these environments. Learn how to automate manual administrative and maintenance tasks, including provisioning, decommissioning, and patching virtual machines.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.