In This Issue:
1. Editor's Note: Is The Mac More Secure Than Windows? Does It Matter?
2. Today's Top Story
- The Search For Microsoft Researcher Jim Gray
3. Breaking News
- Laptop Lockdown Checklist: Four Authentication Areas To Watch
- 10 Top Mac Apps For The Enterprise
- T-Mobile Offers Free Wi-Fi To PSP Players
- Worm Attack Masquerades As IE7 Download Offer
- Dell's March To Linux PCs Won't Be A Walk In The Park
- In A Reversal, India Is Outsourcing To IBM
- Google Patent Application Promises Cleaner Data
- Despite Vulnerabilities, Apple's Mac OS X Weathers The Security Storm
- TiVo Adds Sharing Of Internet Video
- Microsoft Nixes 'Big Bang' Service Pack For Windows Vista
- ICANN Again Vetoes .XXX Adult Content Domain
- Does Disallowed DVR Service Foretell YouTube's Fate?
- Intel Research Goes For Long-Distance Wi-Fi
- Cisco And IBM Aim For Smarter Video Surveillance
- China Eyes Military Uses Of Cyberspace
- Red Hat's Cash-Flow Forecast Beats Expectations
- Microsoft Investigating Windows Zero-Day Bug
4. The Latest Digital Life Blog Posts
- Could The iPhone Destroy Apple's Reputation?
- Microsoft Describes How Virtual Earth Was Built
- Yahoo And Microsoft Fight For Mobile Search While Google Pushes For The Entire Third Screen
- Microsoft Research Provides Sneak Preview Of 'Boku' Programming Environment For Kids
5. Job Listings From TechCareers
6. White Papers
- Fund Raising And Record-Keeping Software As A Service: A Total Communications System
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"Remember that as a teenager you are at the last stage of your life when you will be happy to hear that the phone is for you." -- Fran Lebowitz
1. Editor's Note: Is The Mac More Secure Than Windows? Does It Matter?
Is the Mac more secure than Windows, in some absolute measurement of security? And does it really matter? Senior writer Sharon Gaudin talked to a few security experts and reported the consensus that, despite a recent increase in reported security flaws, the Mac is still more secure than Windows. But it's doubtful that'll change anybody's buying decisions -- Windows users know that their software has security problems, and yet they use it anyway.
McAfee last year said that reported Mac vulnerabilities increased 228% in the past three years, compared with a 73% increase for Windows. And Apple is lagging behind Microsoft in issuing bug fixes, with Apple taking an average of 66 days to patch vulnerabilities, while Microsoft took three weeks.
But the Mac is still safer than Windows, says Johannes Ullrich, chief research officer at the SANS Institute. It's just not as safe as Apple pretends it is.
Read the rest of the article for more information and discussion.
The security comparison is interesting information. But just how useful is it? I've never encountered anyone who cited security as a reason for buying a Mac. They buy a Mac for stability, ease of use, because they're doing graphics or multimedia or some other application for which the Mac is best. They buy a Mac out of desire to stick it to Microsoft, for which many people in the user community have an irrational hatred. But I've never heard anybody say, "I bought a Mac because it's more secure."
Google Patent Application Promises Cleaner Data
The application describes a system for verifying listing information submitted by users, such as a merchant might enter when providing data to the Google Local Business Center about his or her business.
China Eyes Military Uses Of Cyberspace
China's development of modern modes of warfare, including military uses of outer space and cyberspace, has yielded impressive gains that require U.S. vigilance, experts told a congressional panel.
On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.
----- The latest research, polls, and tools -----
Business Intelligence Report
Business intelligence, as we've known it, is about to explode. How will increased access and vendor consolidation impact your company's BI plans? Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection in this recent InformationWeek Research report. Use this report to evaluate your organization's business intelligence strategies and make a plan for the future.
Web 2.0 Applications
As you watch Web 2.0 technologies take hold in the consumer market, start thinking now about the impact they can have in your enterprise. This InformationWeek Research report, Enterprise 2.0, will provide a glimpse into the adoption of Web 2.0 applications in the enterprise environment. Use this report to evaluate adoption plans and understand the challenges and impact these technologies will have on users.
Could The iPhone Destroy Apple's Reputation?
MarketWatch columnist John Dvorak argues that Apple should just make the iPhone a reference design and move on. Why, you may ask, would Apple want to walk away from the hottest mobile device in years? Because it isn't equipped to handle the demands of the nonstop mobile phone market, that's why.
Microsoft Describes How Virtual Earth Was Built
You want to know what the definition of "cool" is? It's sitting in the front row of a hotel meeting hall, watching a demo of Microsoft Virtual Earth on the 12-foot display in the front of the room, as the camera plunges from the sky to swoop and soar around detailed digital models of the Staples Center in Los Angeles and the streets of Philadelphia. Even cooler: Listening to John Curlander, general manager of Microsoft Virtual Earth, explain how it was built.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.