In This Issue:
1. Editor's Note: No (DRM) Code For Pearl Jam
2. Today's Top Stories
- Microsoft Posts Sample IM, Presence Code
- New IM Worm Talks In Tongues
- Analyzing IE At 10: Integration With Operating System Smart
- Microsoft Mum On Windows 95 10th Anniversary
3. Breaking News
- Symantec: Zotob Could Be Modified To Attack Windows XP
- Embattled CA Faces Hungry Shareholders
- Database That Helped BTK Detectives May See Wider Use
- Intel Envisions 'User-Aware' Platforms
- Partners Release First Detailed Specs For Cell Microprocessor
- Google Releases New Desktop Search Beta
- Security Expo Showcases Latest In Terror-Prevention Gear
- Tech Workers Still Trying To Solve Heathrow Computer Outage
- Whiz-Bang Wireless At The Scene Of A Crime
- Microsoft Beefs Up Developer Tools For Collaborative Apps
- Microsoft To Expand Anti-Phishing Tool
- New Software Makes Podcasts Mobile
4. In Depth: Personal Tech & Reviews
- Hot Apps: GhostSurf 2005
- Review: McAfee Secures The Home Wireless LAN
- Review: JunxionBox Allows You To Mix Cellular And Wi-Fi On
- Tutorial: Build A Dual-Core System
- Intel, Matsushita Team To Develop 8-Hour Notebook Battery
- Review: Flash Player 8 Beta
5. Voice Of Authority
- Intel, Microsoft, And The Coming DRM Clampdown
6. White Papers
- The Integrated Contact Center
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"If a cluttered desk is the sign of a cluttered mind, what is the
significance of a clean desk?" -- Versions of this are variously
attributed to Laurence J. Peter and Albert Einstein
1. Editor's Note: No (DRM) Code For Pearl Jam
When Pearl Jam hits the stage for its upcoming U.S. and Canadian
tour, fans will be able to download music from the live shows
within hours of the final encore (probably before most of the
band's faithful can get their cars out of the arena parking lot
after the show). True to its fiercely independent approach to
both music and the recording industry, the band will make its
work available online without the protection of any
digital-rights-management software. This time, however, it's not
just a matter of principle. The band is waiting for
digital-rights-management technology to catch up with its fans.
Pearl Jam has been offering oxymoronic "official bootlegs" of its
concerts since its 2000 tour, when fans could purchase these live
recordings from retail stores. In 2003, the band offered links on
its site where fans could listen to that year's concert clips as
well as order concert CDs delivered by mail.
With this latest incarnation of official bootlegging, Pearl Jam
is offering professionally mixed concert recordings via its Web
site within hours of a live show. The recordings are encoded at a
heady 192 Kbps and cost $9.99 per show. Here's where it really
gets interesting: There are no restrictions on how the recordings
are shared once they're purchased. In other words, the band has
opted to sell its music without digital-rights-management
This time around, maybe Pearl Jam's dissidence will end up
promoting change not just in the entertainment industry but in
the IT world as well. You can read more on the pioneering band's
influence on the thorny topic of DRM in my blog entry.
Another take on this topic can be found in this issue's Voice Of Authority, where Alexander Wolfe complains that
it's the mostly honest folks who are penalized by DRM and
predicts a clampdown is on the way.
Finally, if you missed the In Depth package of stories on
digital-rights management on the InformationWeek home page and in
yesterday's Daily Newsletter, you can catch up by going to our new newsletter archive page and clicking on Aug. 25.
Throwing more fuel on the instant-messaging fire, Microsoft on
Thursday released sample code and new controls to show how IM and
presence can be integrated into everyday business applications.
New IM Worm Talks In Tongues
A worm running through Microsoft's instant-message network is
dropping spyware bots onto compromised Windows PCs using new
multilanguage smarts, security vendors said Thursday.
Related Stories: Analyzing IE At 10: Integration With Operating System Smart Or Not?
This week marks not only the 10th anniversary of the release of
Windows 95, but also the same landmark for Microsoft's browser,
Internet Explorer, software that's been, by turns, an underdog,
the root of a government antitrust trial, and the cause of more
security problems than any other single component of the
The current crop of Zotob bot worms could be modified without
much trouble to attack PCs running Windows XP and XP SP1, a
Symantec executive said Thursday.
Embattled CA Faces Hungry Shareholders
Executives were fired. An accounting scandal unfolded. But it
really upset Computer Associates' shareholders when the
management-software company failed to feed them at their annual
Google Releases New Desktop Search Beta
The new version includes a sidebar designed to personalize the
application, with mini apps that return information from news,
RSS and Atom feeds, photo sites, and other information sources,
based on the user's previous Web activities.
Whiz-Bang Wireless At The Scene Of A Crime
New mesh-networking software from PacketHop lets police and first
responders use their mobile devices to set up wireless networks
that don't require Wi-Fi access points or routers.
A Week's Worth Of Dailies--All In One Place
Have you missed an issue or two of the InformationWeek Daily? Or
want to check out some recent quotes of the day? Check out our
all-new Daily newsletter archive page and get caught up quickly.
Most companies bring consultants in to provide some sort of
knowledge transfer to their employees. Compare your company's
consulting initiatives and achievements to the practices and
successes of 360 of its peers in Consultant Conundrum, an
Optimize magazine executive research report.
You want to stay anonymous on the Web? This will make you
invisible. GhostSurf does anonymizing in an easy-to-use package,
and its Platinum edition adds anti-spyware features.
Review: McAfee Secures The Home Wireless LAN
Even the experts disagree about many elements of wireless LAN
security. But one thing about which most experts agree is that
home users rarely implement even the most basic wireless security
measures. And, if they're using their home network to connect to
their work network, this lack of security endangers enterprise data.
By now it's becoming pretty clear that the age of digital-rights
management is upon us. Thieves, of course, don't have a whole lot
to fear from DRM, since they're of a mind to ignore those
protections that are weak and hack away until they defeat the
stronger barriers against copying. No, it's mostly honest folks
who are penalized by DRM, according to Alexander Wolfe.
In typical contact centers, a customer-service rep's work is
fragmented across multiple applications, with data and
application functionality divided among rigid silos of
automation. With integrated solutions assembled with Above All
Studio, customer-service representatives have instant, timely access
to all the information and business functionality they require.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.