This technology brief by Blue Coat Systems details the vulnerabilities hackers use to take advantage of the web for attacks. To see entire document click on the link below:
Articles Posted in Information Technology
Implementing Knowledge Management: Key Planning Considerations
BY Brett Haywrd, Vice President of Professional Services for the Americas, InQuira
Summary:
Today’s consumers expect fast and convenient online self-service, and they demand knowledgeable, responsive support from contact center agents-anything less and today’s consumers are perfectly willing to take their business elsewhere.
Lessons from the Best Web Sites on Capitol Hill: The Gold Mouse Report
The information below is from the Press Release announcing the Report, followed by a link to the complete Report:
Washington, D.C. – A new report from the Congressional Management Foundation (CMF) on congressional Web sites says the overall quality “continues to be disappointing,” with more than 40% of congressional Web sites earning a substandard or failing grade. The report also contains recognition and praise for the best Web sites on Capitol Hill with the announcement of the winners of the 2007 Gold, Silver, and Bronze Mouse Awards.
“The good news is that 19 more offices won awards in 2007 than did in 2006, including 16 freshmen Members. The bad news is that there were 20 more D’s and F’s,” said Beverly Bell, Executive Director of CMF, a non-profit, non-partisan organization founded 30 years ago to promote a more effective Congress. “We were glad to see good sites getting better, but discouraged to see the bad getting worse.”
Internet Explorer 8 Beta Due in Mid 2008*
The following is an edited version of an article by Peter Galli, published on eWeek.com:.
December 19, 2007
By Peter Galli
A Preview of HTML 5
BY LACHLAN HUNT
Abstract
The web is constantly evolving. New and innovative websites are being created every day, pushing the boundaries of HTML in every direction. HTML 4 has been around for nearly a decade now, and publishers seeking new techniques to provide enhanced functionality are being held back by the constraints of the language and browsers.
Growing Trend Toward On-Demand Web Based Databases
An article by Brian Prince, “On-Demand Trend Touching the Database.” describes a growing trend in the marketplace toward migration to web-based databases. Some of the new or forthcoming databases discussed are SimpleDB beta of Amazon.com, Dabble DB, and Trackvia. A company also mentioned, Kognitio, provides on-demand data warehousing.
One person quoted in the article states that “[Data-as-a-service] is driven by the fact that business the business users cannot get what they need from their IT departments in a timely manner.” Even for those not experiencing IT problems, this is a positive trend because for many users, including online service providers, because of its being incorporated more directly into the seemingly all encompassing web.
Database-as-a-service (DAAS) is based on cloud computing technology. To see the entire article, click here.
Legal Risks of Uncontrolled Email and Web Content
A paper prepared by Hillel L. Parness, Professor, Columbia University Law School and Of Counsel, Lovells (New York) for MessageLabs (http://www.messagelabs.com) ; it includes the following sections: Introduction, The Risks, Harassment, Child Pornography, Defamation, 3rd Party Intellectual Property Rights, Contract Formation, Confidentiality, Dealing With Risks, and a Summary.
Introduction “Email is critical to many businesses; its ease of use, combined with the speed and scale of distribution, make it an invaluable business tool. Today, many businesses could not function without consistent and unfettered access to the Internet.
However, these same attributes can also cause severe difficulties for employers if employees’ use of email and the Internet is not controlled adequately. This short summary considers some of the risks that employers face. It is not a comprehensive study of the topic; therefore, detailed legal advice should always be sought in specific situations.”
Information Organization Future for Libraries
Library Technology Reports 43:6 2007 By Brad Eden
Excerpts from ALA TechSource publication announcment:
“As library technologists and librarians are well aware, since the advent of the Internet, the relationship between the user and his/her library has changed”.
White Paper: Impact of Cybercrime on Your Organization
This white paper explores the emerging crimeware industry, examining web based techniques and methods being used to perpetuate cybercrime, with a focus on the business impact of these attacks. The paper also explores the benefits of real time content inspection technology as a possible solution to help secure enterprises frm the growing crimeware threat..
See the complete whitepaper by clicking on the link below:
RFID Chips in Your Magazines
“Who’s reading magazines and how do they flip through the pages? One research company is using RFID technology to find out.” Question: What are the implications of this development, both positive and negative? Comments welcome.
To read the complete article in the December 12, 2007 CIO Insider, click here.