Tivo's DRM spoils the fun of playing with home media networks and locks users into a walled media garden.
Between the Lines
Larry Dignan and other IT industry experts, blogging at the intersection of business and technology, deliver daily news and analysis on vital enterprise trends.
Larry Dignan is Editor in Chief of ZDNet and SmartPlanet as well as Editorial Director of ZDNet's sister site TechRepublic.
Rachel King is a staff writer for ZDNet based in San Francisco.
Zack Whittaker writes for ZDNet, CNET, and CBS News. He is based in New York City.
Notable headlines:The big marketing lie on flash drive performance.Vista starts to ramp up:Would you (legally) download Vista?
Part microsite topic portal and part community site, Boxxet just officially launched with more than 450 topics. The service aggregates news, blogs, photos, bookmarks and products associated with topics, such as sport teams, TV shows, personalities, hobbies and autos.
Expectations for Apple earnings going into its fiscal first quarter results were high, but the company easily cleared the bar. The rub: Apple was conservative with its second quarter outlook.
So let me get this straight: Jeffrey Brett Goodin sends out a bunch of e-mail scams, is successful with them and now faces 101 years. Phishing is a scourge but isn't this a bit excessive?
Perusing analyst research notes and Intel's financial results a few key facts stick out: --Revenue was above expectations by a good bit yet earnings were just above consensus. Translation: The price war with AMD is hurting Intel too.
Baseline's David Carr has an interesting tale of MySpace's IT operations. In a nutshell, the company is winging it with a Microsoft-based platform amid massive growth.
NOTABLE HEADLINES:Small drives cross performance threshold.AOL phisher faces up to 101 years in prison.
At the end of last year, Oracle took aim at Red Hat with a support program that seriously undercut Red Hat's pricing. Oracle's pricing claims might be a bit of smoke and mirrors, but it is giving customers something to think about as contracts come up for renewal.
The game of leapfrog between code defenders and attackers in cyberspace will continue to be waged as long as code is written. But the majority of security holes could be eliminated.