Online photos: Are they the new digital fingerprint?

Posted by & filed under Cyber Security, IT Security, IT Standards, Privacy, Social Computing, Social Networks.

Discussion: Digital photos on the Web may contain information revealing where and when the shot was taken and might even lead to the identification of the faces in the photo.  Coye Cheshire, A UC Berkeley professor, is researching people’s perceptions of the pictures they post online and he’s learning that people tend to perceive a… Read more »

How did Google lose, and find, all those e-mails?

Posted by & filed under Business Analytics, Business Intelligence, Cloud Computing, Cyber Security, IT Governance, IT Infrastructure, IT Security, IT Standards, IT Strategy, Search Engine, Social Computing, Social Networks.

Discussion: Due to a glitch in a software update, tens of thousands of Google e-mail users got a pretty big shock recently: All of their emails and contacts disappeared.  Fortunately, Google was able to recover all those lost emails and contacts, but the process took hours because the search giant backs up all e-mail data… Read more »

The Real Internet Censors: Unaccountable ISPs?

Posted by & filed under Civil Liberties, Cyber Security, Intellectual Property, IT Governance, IT Standards, IT Trends, Privacy.

Discussion: A recent report by the European Digital Rights (EDR) group warns that nations are slowly turning ISPs into “off-duty information cops.”  Eager to appease politicians in order to achieve their own goals, networks are cooperating with governments looking for easy, informal solutions to difficult problems like copyright infringement, dangerous speech, and child pornography.  But… Read more »

BYOC: Should employees buy their own computers?

Posted by & filed under Business Analytics, Business Intelligence, Cyber Security, E-Business, IT Infrastructure, IT Investment, IT Planning, IT Security, IT Strategy, IT Trends, Mobile Computing, Virtualization, Wireless.

Discussion: Struggling to keep up with ever-changing technology and the cost of IT provisioning, companies are adopting the “bring your own computer” (BYOC) policy.   Not only do employees have the freedom to choose their own devices, they also have the freedom to access their office desktop remotely.  Both Microsoft and Intel subsidize hardware, while Citrix… Read more »

U.S. broadband speeds lag behind global counterparts

Posted by & filed under Cyber Security, IT Infrastructure, IT Trends, Mobile Computing.

Discussion: Akamai, a company that provides Internet statistics on broadband speed and mobile connectivity, recently released the quarterly “State of the Internet” report.  Of the 100 global cities with the fastest average broadband connections, South Korea and Japan collectively boast the top 45, while the United States has just 13 cities in the top 100… Read more »

Can IT give users a consumer-like experience? Should they?

Posted by & filed under Business Intelligence, Change Management, Cyber Security, E-Business, IT Governance, IT Infrastructure, IT Investment, IT Planning, IT Security, IT Strategy, IT Trends.

Discussion: Aided by a growing array of consumer applications on the Web and mobile phones, IT users have changed their expectations about how applications should function at work.  If they are so darn easy to use at home, shouldn’t the same apply at work?  Thus the term “consumerization,” which is the effect of end-users setting… Read more »

The Internet and the ‘end of privacy’

Posted by & filed under Cyber Security, Internet Advertising, IT Governance, IT Security, IT Standards, Mobile Computing, Search Engine, Social Computing, Social Networks.

Discussion: As people share more information about themselves online, the Internet has created a public transcript of consciousness – storing our thoughts, locations, social lives, and memories in data warehouses all over the world.  With a scarcity of effective methods to manage online privacy and digital marketers always lurking in cyber space, some privacy advocates… Read more »

Explain it to me: Cyber attacks

Posted by & filed under Cyber Security, E-Business, E-Commerce, IT Security, IT Strategy.

Description: CNN.com’s tech writer John Sutter explains why the recent denial-of-service cyber attacks were more a political protest than a breach in online security. Source: CNN.com Date: December 10, 2010 Link: http://www.cnn.com/video/#/video/tech/2010/12/09/explain.it.to.me.cyber.attacks.cnn Questions for discussion: How does a hacker wage a denial of service attack? Why were several credit card companies recently targeted this way… Read more »