___________________________________________________________
Computerworld Web Site Management
April 05, 2007
___________________________________________________________
***************SPONSOR**************************************
Survey Says: Small Organizations thinking Big about Disaster and Data
Companies of 10 employees or 10,000 employees face the same challenge day in
and day out: Protect business-critical data. But with smaller companies,
allocating resources to this chore can be taxing. Tune into this on demand
webcast, Survey Says: Small Organizations Thinking Big about Disaster and Data,
to see what some 250 of your small-business peers are doing to ensure business
as usual.
http://cwflyris.computerworld.com/t/1421252/1378785/47577/0/
************************************************************
___________________________________________________________
In this issue:
* Hackers now offer subscription services, support for their malware
* Don't Believe the Hype: The 21 Biggest Technology Flops
* Mozilla eyes hardening Firefox against ANI exploits
* Google to build $600M data center in S.C.
* Domain name application gives phishers a new foe
* Google agrees to update New Orleans imagery in Maps and Earth
* How Webkinz is getting children hooked on the Web
* Reznor adopts unusual Web campaign for new album
* Google sssearch turns up wayward snake
* Web 2.0 can be hijacked, claims Fortify
Computerworld Blogs:
* EMI and Jobs blow away DRM (and historic Beatles)
* Round 6: H-1B Battle - American engineering's "April Fools"
* Shark Tank: Test session, redefined
* The more things change ...
___________________________________________________________
OTHER RESOURCES
_______________
How confident are you in your HA/DR plan? View this webcast now.
http://cwflyris.computerworld.com/t/1421252/1378785/55208/0/
Careful What You Search For...Join Computerworld and Oracle on April 25th, 2007
for this live webcast as they review the latest low-cost, easy-to-deploy search
solutions.
http://cwflyris.computerworld.com/t/1421252/1378785/55978/0/
Read this Executive Snapshot, to learn about the capabilities of different
types of firewall, IDS, and IPS tools, and best practices for deploying them.
http://cwflyris.computerworld.com/t/1421252/1378785/56409/0/
_________________________________________________________
Hackers now offer subscription services, support for their malware
Malware makers and cybercriminals are now turning the distribution of Trojan
horses, spyware and data theft software into an online business, offering their
products to buying customers and paying for results.
http://cwflyris.computerworld.com/t/1421252/1378785/58048/2/
_________________________________________________________
Don't Believe the Hype: The 21 Biggest Technology Flops
We fondly recall 21 overpromoted products and technologies that utterly failed
to live up to their hype -- and ask you to choose the biggest flop of them all.
http://cwflyris.computerworld.com/t/1421252/1378785/58049/2/
_________________________________________________________
Mozilla eyes hardening Firefox against ANI exploits
Mozilla Corp. is looking at ways it could toughen the Firefox browser against
the Windows animated cursor (ANI) file bug, according to the company's lead
developer.
http://cwflyris.computerworld.com/t/1421252/1378785/58050/2/
_________________________________________________________
Google to build $600M data center in S.C.
Google plans to invest $600 million in a new data center in South Carolina, the
state government said on Wednesday.
http://cwflyris.computerworld.com/t/1421252/1378785/58051/2/
_________________________________________________________
Domain name application gives phishers a new foe
A 26-year-old programmer has created an application to track newly registered
domain names closely to see if they turn into live phishing sites.
http://cwflyris.computerworld.com/t/1421252/1378785/58052/2/
_________________________________________________________
***************SPONSOR**************************************
Learn from Success: Integrating Legacy with SOA for Faster Business Processes
$6 million...$30 million...$500,000...These are the real savings companies are
reporting by transforming their powerful, secure Legacy systems into flexible
SOA applications that meet the changing needs of their business. Before going
down the road of "ripping and replacing" your valuable Legacy systems, join us
and hear from the experts on how you can have the best of both worlds by
integrating your Legacy with your SOA...and save your company millions at the
same time. It's not as hard as you think.
http://cwflyris.computerworld.com/t/1421252/1378785/43339/0/
************************************************************
_________________________________________________________
Google agrees to update New Orleans imagery in Maps and Earth
A congressional subcommittee wanted to know why Google replaced post-Katrina
satellite imagery of New Orleans with pre-Katrina images.
http://cwflyris.computerworld.com/t/1421252/1378785/58053/2/
_________________________________________________________
How Webkinz is getting children hooked on the Web
Plush toys are sold with a secret code that children can use to enter online
games and activities.
http://cwflyris.computerworld.com/t/1421252/1378785/58054/2/
_________________________________________________________
Reznor adopts unusual Web campaign for new album
Campaign features everything from cryptic phrases on T-shirts to Orwellian Web
sites to MP3s found on USB drives in bathrooms at concerts.
http://cwflyris.computerworld.com/t/1421252/1378785/58055/2/
_________________________________________________________
Google sssearch turns up wayward snake
Employees at Google's New York offices can rest easier now that Kaiser, a
3-foot-long ball python, has been captured after disappearing from his tank
over the weekend.
http://cwflyris.computerworld.com/t/1421252/1378785/58056/2/
_________________________________________________________
Web 2.0 can be hijacked, claims Fortify
Security vendor Fortify Software says a flaw in AJAX frameworks can enable an
attacker to pose as the application's user and intercept data sent via
JavaScript commands.
http://cwflyris.computerworld.com/t/1421252/1378785/58057/2/
_________________________________________________________
***************SPONSOR**************************************
How Organizations Are Managing Their Online Channel
In November 2006, Computerworld invited IT respondents to participate in a
survey on the management of their organizations online channels. The goal of
the survey was to better understand the involvement of the technology and
business teams in management of and responsibility for the online channel. The
following report represents top-line results of the survey conducted among 230
IT respondents.
http://cwflyris.computerworld.com/t/1421252/1378785/58058/0/
************************************************************
___________________________________________________________
COMPUTERWORLD BLOGS
___________________
EMI and Jobs blow away DRM (and historic Beatles)
Monday's IT Blogwatch comes to you from from sunny London: in which EMI and
Steve Jobs are expected to remove DRM from their music. Not to mention The
Beatles on Doctor Who in 1965...
http://cwflyris.computerworld.com/t/1421252/1378785/58059/2/
___________________________________________________________
Round 6: H-1B Battle - American engineering's "April Fools"
Good morning, you're fired and getting replaced by a software engineer from
India with an H-1B visa ... APRIL FOOLS! This is a bad joke to play on an
engineer these days, because it is just too close to actually being true.
http://cwflyris.computerworld.com/t/1421252/1378785/57418/2/
___________________________________________________________
Shark Tank: Test session, redefined
Software developer pilot fish knows this user is an expert at testing
applications -- after all, he's told her so. He boasts about the time he spent
working as a software tester in an IT shop, fish says.
http://cwflyris.computerworld.com/t/1421252/1378785/57176/2/
___________________________________________________________
The more things change ...
When I was in grad school, I tried to explain to a really nice man that some of
his colleagues were great and some were slime. All of them were my faculty
members. We had a chat about complimenting a woman on her attire. Seems
straight forward:
http://cwflyris.computerworld.com/t/1421252/1378785/57177/2/
___________________________________________________________
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at [EMAIL PROTECTED]
Please include your subscriber e-mail address in all
correspondence: [email protected]
ADVERTISING
-----------
For information on advertising, contact
[EMAIL PROTECTED]
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://www.computerworld.com/action/pages.do?command=viewPage&pagePath=/about_policies
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_web_site_management as: [EMAIL
PROTECTED]
To unsubscribe, change your preferences, or change your e-mail address, go to
the following URL:
http://www.computerworld.com/action/member.do?command=newsletterLogin
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://www.computerworld.com/action/member.do?command=registerNewsletters
Copyright 2007
Computerworld Inc.
1 Speen Street
Framingham MA 01701