Other
Commentary
7/30/2007
08:04 PM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Windows XP A Shaky Bridge To Windows 7

In This Issue:
1. Editor's Note: Hacking The Vote
2. Today's Top Story
    - Gartner: Windows XP A Shaky Bridge To Windows 7
     Related Stories:
    - Microsoft's Open Source Strategy Coming Into Focus
    - With Its Head In The 'Cloud,' Microsoft Talks Web Services
3. Breaking News
    - FCC Prepares To Set Rules For 700-MHz Auction
    - Review: 3 TV Tuners For The Mac
    - A Buyer's Guide To Ultramobile PCs
    - Survey: Many IT Managers Are Planning To Replace Wired Nets With 802.11n
    - Multimedia Is Driving Handset Accessories Market
    - Yahoo Testimony About Imprisoned Reporter Contradicted
    - Risk Management System Busts Data Skimming Ring
    - Oracle's Secret Weapon: Charles Phillips
    - HP-Opsware Deal Shows IT Automation Kicking Into High Gear
    - SOA Security: One Treacherous Journey
    - Cisco Sticks Its Foot In The Data Center Door
    - MySpace Defends Search Technology For Sexual Predators
4. The Latest Google Blog Posts
    - Just How Successful Are Google's Mobile Initiatives?
    - Search's Dirty Money
    - Where Is 'Above The Fold' In A Web 2.0 World?
    - YouTube's Reign Of Terror
5. Job Listings From TechCareers
6. White Papers
    - Enhancing Product Life-Cycle Management With Critical Message Governance
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription

Quote of the day:
"It's not the voting that's democracy, it's the counting." -- Tom Stoppard


1. Editor's Note: Hacking The Vote

Anyone following the controversy over whether voting machines promote or threaten our ability to determine who, exactly, has won a particular election was probably not surprised by the initial results of California's review of voting systems released last week. The question is this: Will this latest evidence that such machines can be easily manipulated force much-needed changes before the next major election?

Although California's "top-to-bottom review" of voting machines from Sequoia, Diebold, and Hart identified numerous vulnerabilities--including the potential for gaining internal access to systems by undoing screws to bypass locks, overwriting firmware, and exploiting known vulnerabilities in the Windows operating system--many opponents to the widespread use of these machines doubt whether legislation winding its way through Congress will be enough to reassure citizens that their votes are being accurately counted. Although a House bill would eventually require every state to keep paper records so voters could verify that their ballots had been counted, most states will have until 2012 to upgrade paperless machines to ones with backup paper trails. This kind of delay is unacceptable given that the integrity and credibility of our very electoral process is in question.

An interesting anecdote: The last time I voted, about a dozen of us waited in line for our turn to mark our paper ballots in one of the private voting cubicles even through two electronic voting machines were standing by. The polling place manager kept inquiring if anyone wanted to use one of the machines; she got no takers. When asked how many citizens had opted to go the automated route, she ruefully shook her head and said, "Just three." This was at 4 p.m., after the polls had been open all day. And, being in the heart of Silicon Valley, it's hardly a Luddite constituency. In fact, one well-dressed man in his 50s spoke up. "We all know too much to trust technology," he said, and a number of other waiting voters nodded.

What do you think? Have you voted on a voting machine? How confident were you that the results were accurate? Do you believe there should be more safeguards in place before we depend on these systems? Let us know by responding to the InformationWeek Blog.

Alice LaPlante
Alice.laplante@gmail.com
www.informationweek.com


2. Today's Top Story

Gartner: Windows XP A Shaky Bridge To Windows 7
Gartner warns that businesses that decide to stick with Windows XP -- Windows Vista's predecessor -- until Windows 7 is available may be pushing their luck.

Related Stories:

Microsoft's Open Source Strategy Coming Into Focus
If Microsoft and OSI come to terms, IT organizations should not interpret this as a radical shift in Microsoft's long-term business strategies, analysts suggest.

With Its Head In The 'Cloud,' Microsoft Talks Web Services
Company leaders outline progress and promise more resources in software-plus-services push.


3. Breaking News

FCC Prepares To Set Rules For 700-MHz Auction
The prospect of spectrum becoming available for wireless services already has attracted a lot of attention from major companies.

Review: 3 TV Tuners For The Mac
If you've got a Mac, want to make it an entertainment center, and don't want to invest in an Apple TV, here are some TV tuners to check out.

A Buyer's Guide To Ultramobile PCs
Ultraportables used to sacrifice too much performance. They're beefing up on features -- not weight.

Survey: Many IT Managers Are Planning To Replace Wired Nets With 802.11n
In spite of the professed enthusiasm by the surveyed IT managers for 802.11n, the survey found big gaps in their understanding of the technology.

Multimedia Is Driving Handset Accessories Market
Headsets, memory cards, and data-connection kits will account for more than half of the growing accessories market this year, says market research firm.

Yahoo Testimony About Imprisoned Reporter Contradicted
A document from the Beijing State Security Bureau suggests that Yahoo possessed more information than it has admitted to about Chinese journalist Shi Tao.

Risk Management System Busts Data Skimming Ring
Four men have pleaded guilty to using phony point-of-sale PIN-pad terminals to steal customers' data and passwords and then defraud stores.

Oracle's Secret Weapon: Charles Phillips
The former Morgan Stanley software analyst has emerged as one of the most powerful people in the software industry. How long can he keep customers satisfied and Wall Street happy?

HP-Opsware Deal Shows IT Automation Kicking Into High Gear
Automation has been an elusive goal in the data center. Acquisitions and better tools are changing the outlook.

SOA Security: One Treacherous Journey
Are you ready to deal with the risks of opening your service-oriented architecture to business partners?

Cisco Sticks Its Foot In The Data Center Door
New data center appliance houses network, server, and storage resources as virtual services.

MySpace Defends Search Technology For Sexual Predators
Other sites should follow our lead, says MySpace security chief.

All Our Latest News

On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.


----- The latest research, polls, and tools -----

Web 2.0 Applications
This InformationWeek Research report, Enterprise 2.0, will provide a glimpse into the adoption of Web 2.0 applications in the enterprise environment.

10th Annual Information Security Survey
InformationWeek Research's 10th annual Information Security survey, a joint research project with Accenture, examines security issues such as security investments and priorities.

-----------------------------------------


4. The Latest Google Blog Posts
http://www.informationweek.com/blog/google/

Just How Successful Are Google's Mobile Initiatives?
Japan's No. 2 carrier, KDDI, said it plans to offer a new mobile e-mail service powered by Google's Gmail. This is the latest in a long line of Google-related mobile announcements. While Google's mobile onslaught continues, this question remains: Just how successful are the search giant's efforts?

Search's Dirty Money
Dirty money is a quaint concept because it's hard to imagine any other kind. Money is literally dirty -- some 18% of coins harbor pathogens, according to a 1998 study by Shirley Lowe, an assistant professor at the University of California -- and many great fortunes were made out of less-than-honorable work.

Where Is 'Above The Fold' In A Web 2.0 World?
Blogger Milissa Tarquini at Boxes and Arrows questions the nature of the so-called "fold" in a Web 2.0 world. Tarquini asks a really great question: Where is the fold?

YouTube's Reign Of Terror
The next leader of the free world may have stood on stage at The Citadel last week, but the real power in the room was YouTube. Politicians are terrified of the video-sharing site. How else to explain their participation in a 90-minute YouTube infomercial masquerading as a debate?


5. Job Listings From TechCareers

ISES, Inc. seeking SAP Plant Maintenance Business Analyst in Swiftwater, PA

Genworth Financial seeking IT Solutions Leader in Richmond, VA

[X+1] seeking Client Solutions Architect in New York, NY

ITT Corporation seeking IT Business Systems Mgr. in Fort Wayne, IN

McFadyen Consulting seeking eBusiness Project Manager in Vienna, VA

For more great jobs, career-related news, features and services, please visit CMP Media's TechCareers.


6. White Papers

Enhancing Product Life-Cycle Management With Critical Message Governance
Critical message governance is required to make sure that your product life-cycle management environment possesses a secure, auditable method of internal and external stakeholder message notification and file exchange.


7. Get More Out Of InformationWeek

Try InformationWeek's RSS Feed

Discover all InformationWeek's sites and newsletters

Recommend This Newsletter To A Friend
Do you have friends or colleagues who might enjoy this newsletter? Please forward it to them and point out the subscription page.

Visit InformationWeek's Online Marketplace to learn more about the products, technologies and companies that will help you meet your business technology needs.


8. Manage Your Newsletter Subscription

You are subscribed as #emailaddr#. To unsubscribe from, subscribe to, or change your E-mail address for this newsletter, please visit the InformationWeek Subscription Center.

Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
InfoWeek@update.informationweek.com

If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.

We take your privacy very seriously. Please review our Privacy Policy.

InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2007 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.