This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
In This Issue:
1. Editor's Note: Hacking The Vote
2. Today's Top Story
- Gartner: Windows XP A Shaky Bridge To Windows 7
- Microsoft's Open Source Strategy Coming Into Focus
- With Its Head In The 'Cloud,' Microsoft Talks Web Services
3. Breaking News
- FCC Prepares To Set Rules For 700-MHz Auction
- Review: 3 TV Tuners For The Mac
- A Buyer's Guide To Ultramobile PCs
- Survey: Many IT Managers Are Planning To Replace Wired Nets With 802.11n
- Multimedia Is Driving Handset Accessories Market
- Yahoo Testimony About Imprisoned Reporter Contradicted
- Risk Management System Busts Data Skimming Ring
- Oracle's Secret Weapon: Charles Phillips
- HP-Opsware Deal Shows IT Automation Kicking Into High Gear
- SOA Security: One Treacherous Journey
- Cisco Sticks Its Foot In The Data Center Door
- MySpace Defends Search Technology For Sexual Predators
4. The Latest Google Blog Posts
- Just How Successful Are Google's Mobile Initiatives?
- Search's Dirty Money
- Where Is 'Above The Fold' In A Web 2.0 World?
- YouTube's Reign Of Terror
5. Job Listings From TechCareers
6. White Papers
- Enhancing Product Life-Cycle Management With Critical Message Governance
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"It's not the voting that's democracy, it's the counting." -- Tom Stoppard
1. Editor's Note: Hacking The Vote
Anyone following the controversy over whether voting machines promote or threaten our ability to determine who, exactly, has won a particular election was probably not surprised by the initial results of California's review of voting systems released last week. The question is this: Will this latest evidence that such machines can be easily manipulated force much-needed changes before the next major election?
Although California's "top-to-bottom review" of voting machines from Sequoia, Diebold, and Hart identified numerous vulnerabilities--including the potential for gaining internal access to systems by undoing screws to bypass locks, overwriting firmware, and exploiting known vulnerabilities in the Windows operating system--many opponents to the widespread use of these machines doubt whether legislation winding its way through Congress will be enough to reassure citizens that their votes are being accurately counted. Although a House bill would eventually require every state to keep paper records so voters could verify that their ballots had been counted, most states will have until 2012 to upgrade paperless machines to ones with backup paper trails. This kind of delay is unacceptable given that the integrity and credibility of our very electoral process is in question.
An interesting anecdote: The last time I voted, about a dozen of us waited in line for our turn to mark our paper ballots in one of the private voting cubicles even through two electronic voting machines were standing by. The polling place manager kept inquiring if anyone wanted to use one of the machines; she got no takers. When asked how many citizens had opted to go the automated route, she ruefully shook her head and said, "Just three." This was at 4 p.m., after the polls had been open all day. And, being in the heart of Silicon Valley, it's hardly a Luddite constituency. In fact, one well-dressed man in his 50s spoke up. "We all know too much to trust technology," he said, and a number of other waiting voters nodded.
What do you think? Have you voted on a voting machine? How confident were you that the results were accurate? Do you believe there should be more safeguards in place before we depend on these systems? Let us know by responding to the InformationWeek Blog.
Oracle's Secret Weapon: Charles Phillips
The former Morgan Stanley software analyst has emerged as one of the most powerful people in the software industry. How long can he keep customers satisfied and Wall Street happy?
On the go?
See InformationWeek's daily breaking news on your mobile device, visit wap.informationweek.com and sign up for daily SMS notifications.
----- The latest research, polls, and tools -----
Web 2.0 Applications
This InformationWeek Research report, Enterprise 2.0, will provide a glimpse into the adoption of Web 2.0 applications in the enterprise environment.
10th Annual Information Security Survey InformationWeek Research's 10th annual Information Security survey, a joint research project with Accenture, examines security issues such as security investments and priorities.
Just How Successful Are Google's Mobile Initiatives?
Japan's No. 2 carrier, KDDI, said it plans to offer a new mobile e-mail service powered by Google's Gmail. This is the latest in a long line of Google-related mobile announcements. While Google's mobile onslaught continues, this question remains: Just how successful are the search giant's efforts?
Search's Dirty Money
Dirty money is a quaint concept because it's hard to imagine any other kind. Money is literally dirty -- some 18% of coins harbor pathogens, according to a 1998 study by Shirley Lowe, an assistant professor at the University of California -- and many great fortunes were made out of less-than-honorable work.
YouTube's Reign Of Terror
The next leader of the free world may have stood on stage at The Citadel last week, but the real power in the room was YouTube. Politicians are terrified of the video-sharing site. How else to explain their participation in a 90-minute YouTube infomercial masquerading as a debate?
State of the CloudCloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
The Cloud Gets Ready for the 20'sThis IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!