Web Browsing Tricks Make Your Smartphone Act Like An iPhone
InformationWeek Daily - Tuesday, Aug 14, 2007
Should Business Or Government Do Our Terrorist Screening?
Ever since Sept. 11, 2001, there's been a question of how big a role businesses such as airlines and banks should play in helping to identify terrorists. The Department of Homeland Security's headed in the right direction in wanting to take passenger screening over from the airlines.
Late last week, the Department of Homeland Security proposed that it begin doing the screening of passenger names against the government's terrorist watch list database. Today, DHS sends the watch list to airlines, and they do the screening. DHS Secretary Michael Chertoff, speaking at a press conference, suggested he wasn't satisfied that airlines are consistent enough in how they update their lists. "If they're slow, or if they do it once a day or more slowly than that, they're going to be more out of date," Chertoff said. "This gives us a much closer connection to the real-time information."
This move is part of Chertoff's effort to implement DHS's Secure Flight program, a passenger screening project that's been marred by privacy mistakes and technical obstacles. He proposes the Transportation Security Administration start screening tests this fall using data from air carriers that volunteer to provide it. In another new regulation announced at the same time, DHS will require airlines provide the TSA with passenger data for all international flights in or out of the U.S. a half hour before a plane takes off. DHS will integrate that system into Secure Flight.
It seems to me that Chertoff's heading in the right direction. Secure Flight's had its missteps, with privacy problems foremost among them. Chertoff says the data will be checked against the watch list and "disposed of." Those privacy concerns are a place to watch. And any CIO who has to meet data-sharing requirements with the government knows integration can be difficult, and costly. But ultimately it's the federal government, not the airlines, that should be combing passenger lists for terrorists.
Virtualization At The Desktop?
Examine how more than 250 companies plan to adopt server virtualization technology in this recent InformationWeek Research report, Server Virtualization.
The BI Explosion
Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection, in this recent InformationWeek Research report.
Why No 'Intel Inside' Stickers On Macs?
It seemed like a stupid question -- one which deservedly got a heaping helping of ridicule from Mac bloggers: Why doesn't Apple participate in the "Intel Inside" marketing program, earning the company big wads of cash just for putting a tiny little sticker on Macs?
Novell's Victory Over SCO Could Have Downside For Linux Users
The free software world spent the weekend celebrating after a judge nixed SCO's ownership claims over Unix and, by extension, Linux. But the ruling did not specifically address SCO's charge that Linux is a Unix knock off--and a case that could have settled that question for good may now fade away as a result of Friday's decision.
Should Business Or Government Do Our Terrorist Screening?
Ever since Sept. 11, 2001, there?s been a question of how big a role businesses such as airlines and banks should play in helping to identify terrorists. The Department of Homeland Security's headed in the right direction in wanting to take passenger screening over from the airlines.
Groklaw's Pamela Jones On The SCO Decision
By now, everyone knows that the upcoming SCO vs. Novell trial is mostly moot, because Judge Dale Kimball has ruled that Novell owns the Unix copyrights. While the decision marks a welcome end to the three-year-long legal saga, it spotlights the wimpy nature of pundits and many in the computer industry, who cowered on the sidelines, fearful of recommending or adopting Linux while the litigation proceeded, lest SCO sue them, too.
Texting While Driving Redux
As a follow up to the story I wrote the other day about texting while driving, I decided to conduct a highly unscientific little experiment. I took a stroll around my New Jersey neighborhood and looked in each car as it zoomed past. You'd be surprised to learn how many people weren't paying attention to the road.
How to Succeed with Offshore Software Testing When Almost Everyone Else Fails Offshore software testing projects fail at a greater rate than most other types of offshore projects. Most of the research into this problem points to very generic reasons. This paper identifies why offshore software testing projects fail, quantifies the impact of a failure and gives a list of actions that can prevent failure from happening.
Business Technology Marketing Benchmarks 2007-2008 PDF Slides Find out what 1,038 B2B marketers revealed about what works for lead generation and nurturing tactics. Invite your entire team to view this free Webcast and learn about B2B email, search marketing and surprising Webcast and white paper marketing statistics.
Apparel Manufacturer Improves Business Processes Using Everest Software Managing business for menswear manufacturer Kenneth David Apparel was a difficult process. With Everest's ability to analyze and automate everything from e-commerce to point-of-sale functions, Kenneth David Apparel has been given unprecedented visibility into their business and is now able to easily track important factors like profitability.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2007 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.