The other day, I had a discussion with my four year-old son whom I believe to be a budding entomologist. He's never happier than when bugs are crawling all over him.
Between the Lines
Larry Dignan and other IT industry experts, blogging at the intersection of business and technology, deliver daily news and analysis on vital enterprise trends.
Larry Dignan is Editor in Chief of ZDNet and SmartPlanet as well as Editorial Director of ZDNet's sister site TechRepublic.
Rachel King is a staff writer for ZDNet based in San Francisco.
Scott Lemon has been writing lately about what companies (like Google) know about you. In a post called "Google knows who you really are" he concludes: Google knows you like no one else.
This week on The Dan & David Show, we discuss the intersection of technology and terrorism in light of today's failed plot to blow up airplanes in the UK and US, AOL's privacy violation in publishing the search histories of more than 650,000 of its users and Apple's Leopard operating system tease and Mac Pro introduction.
Yesterday, when my colleague Dan Farber and I interviewed VMware CEO Diane Greene for a podcast here on ZDNet, Greene noted that the licensing practices of some of today's vendors are out of lockstep with the direction that technology is taking. If you ask me, that point couldn't be better exemplified by the direction that Microsoft's anti-piracy Windows Genuine Advantage technology is heading when juxtaposed against the benefits of virtualization technology like that which VMware sells.
Guy Kawasaki conducts a brief Q&A with marketing guru Seth Godin. In the interview, Guy asks Seth to give examples of brands build by having conversations with customers, how companies deal with criticism and what enabled him to be successful, which elicted this answer: No ulterior motive.
According to The Register's reporting on this morning's foiled terror plot, passengers looking to fly out of UK airports this morning were not only asked to stow all of their carry-on luggage, they were asked to put any electronics in that luggage. The crackdown on wireless technology apparently included "wireless keys" (often used for cars, but sometimes for other things too) fueling speculation that authorities were concerned about remote detonation.
Gartner is talking up the influence of various, so-called Web 2.0 technologies on businesses.
Here on Between the Lines, I've routinely hounded the US banking industry for not biting the bullet and moving all of its customers (regardless of whether the customers like it or not) to a multi-factor (two or more) system for authenticating users for online banking. For some banks in Europe, it's standard operating procedure.
In response to my post from earlier today about whether AOL's unfortunate release of identity-revealing search date could spark a response from the plaintiffs' bar, Raul Valdes-Perez, CEO of enterprise search solution provider Vivisimo, wrote to me with the following e-mail (edit): I read with keen interest your cited ZDNet article....The lamentable release of AOL user search data, the recent wrangling between several search engines and the U.
The National Institute of Advanced Industrial Science and Technology (NIAIST--apparently all the good acronyms really have been taken) has developed a carpet whose grid of electrodes tracks your footfalls. The magic comes from the analysis algorithm: It can determine your age (between 20 and 60) and gender (with about 75 percent accuracy) based entirely on your gait.