Tag Archive for 2012

Declaration of Internet Freedom

Declaration of Internet FreedomFor too long in the U.S., Congress has attempted to legislate the Internet in favor of big corporations and heavy-handed law enforcement at the expense of its users’ basic Constitutional rights. The Electronic Frontier Foundation writes that Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer.

EFF logoThe EFF and a broad coalition of civil society groups called on elected officials to sign the new Declaration of Internet Freedom and uphold basic rights in the digital world. The Declaration is simple; it offers five core principles that should guide any policy relating to the Internet: stand up for online free expression, openness, access, innovation, and privacy. Sign it here.

 

Declaration of Internet Freedom

Early Signers of Declaration of Internet Freedom

American Civil Liberties UnionCheezburger, Inc.Free Press reddit
Amnesty International Center for Democracy & Technology MacUser magazineTechdirt
BoxeeElectronic Frontier Foundation MozillaTucows

Related articles
  • Amnesty International, Harvard professors sign Declaration of Internet Freedom (nextlevelofnews.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Independence Day

Independence Day 2012

Independence Day 2012

 

Now go out and honor those who have come before you.

  • Turn off the TV
  • Learn about something new
  • Vote

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

 

BYOD Notes

90% of Employees Use Personal Devices for Work

90% of Employees Use Personal Devices for WorkA survey by DELL Kace (DELL) found IT managers feel they lack the necessary tools to properly manage BTOD personal devices. In the study, IT managers revealed they are unable to effectively protect corporate data and intellectual property as well as ensure compliance. Help Net Security says key survey findings include:

  • 87% of companies have employees that use a personal device for work including laptops, smartphones and tablet computers.
  • 82% citing their concerns about the use of personal devices for business use
  • 64% revealed they are not confident that they know of all personal devices being used for business purposes
  • 62% specifically concerned about network security breaches
  • 60% reported a greater demand for support of Mac OS X since the introduction of the Apple (AAPL) iPad and iPhone
  • 59% reported their personal devices have created the need to support multiple operating systems (OS’s).
  • 32% revealed employees use unauthorized personal devices and applications to connect to their network

On the governance side:

  • 88% said they believe it is important to have a policy in place to support personal devices, and another 62 percent revealed their organization lacks the necessary tools to manage personal devices.

It’s absolutely essential that IT teams deploy a strategy that provides end-to-end management capabilities on a variety of operating systems to effectively protect networks and address the consumerization and personalization of IT,” said Rob Meinhardt, general manager and co-founder for Dell KACE.

Related articles

Security Monitoring for BYOD Environments

Security Monitoring for BYOD EnvironmentsUnlike other BYOD security solutions that force organizations to install software on every new device, Lancope’s StealthWatch System provides security for any device entering the network, without having to install more software on the device or deploy expensive probes. Help Net Security reports that StealthWatch performs behavioral analysis on flow data from existing infrastructure to deliver end-to-end visibility and security across an organization’s entire network.

Net flow data already exists in network infrastructure devices to monitor network and host activity. Since net flow is already in most network equipment, it provides a cost-effective tool for monitoring mobile devices. The article says flow-based monitoring can uncover external attacks like botnets, worms, viruses or APTs, as well as internal risks such as network misuse, policy violations and data leakage. It can also be leveraged for other efforts including regulatory compliance and capacity planning, and for ensuring high levels of network and mobile device performance.

Related articles

IT is Embracing BYOD

IT is Embracing BYODIT is Embracing BYODCisco says that IT is accepting, and in some cases embracing, “bring your own device” (BYOD). Help Net Security reports that the networking giant found that some of the pros and cons associated with allowing employees to use their own mobile devices on their employers’ networks has become a reality in the enterprise.

The Cisco (CSCO) study BYOD and Virtualization (PDF) found most enterprises are now enabling BYOD.

  • 95% of responding firms permit employee-owned devices in some way in the workplace.
  • The average number of connected devices per knowledge worker will grow from 2.8 in 2012 to 3.3 by 2014.
  • 76% of IT leaders surveyed categorized BYOD as a positive for their companies and challenging for IT.

The survey says employees are turning to BYOD because they want more control of their work experience:

  • 40% of respondents cited “device choice” as employees’ top BYOD priority (the ability to use their favorite device anywhere).
  • Employees’ second BYOD priority is the wish to do personal activities at work, and work activities during personal time.
  • Staff wants to bring their own applications to work: 69% of respondents said that unapproved applications, especially social networks, cloud-based email, and instant messaging, are more prevalent today than two years ago.
  • Employees are willing to invest to improve their work experience. Cisco employees pay an average of $600 out-of-pocket for devices that will give them more control over their work experience the report says.

The article says these findings underscore that BYOD is here to stay, and managers are now acknowledging the need for a more holistic approach, one that is scalable and addresses mobility, security, virtualization, and network policy management, to keep management costs in line while simultaneously providing optimal experiences where savings can be realized.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

UN Internet Takeover

Network neutralityNetwork neutrality. The idea is that an ISP can’t discriminate against the traffic traveling over its network. Network neutrality is an enshrined legal right in some areas and a hotly contested regulatory fight in others. post over at TechDirt that details the UNs efforts to undermine network neutrality. The articles say the International Telecommunications Union is trying to dictate terms that will affect how traffic flows on the Internet.

UN Internet power grab

UN Internet TakeoverNetwork neutrality opposition at the United Nations arose earlier this month. The power grab started with proposed rules from the European Telecommunications Network Operators Association (ETNO). The article says ETNO wants to gut network neutrality. Glyn Moody at TechDirt has read those documents. He clipped the relevant segments to argue that these proposals would effectively make network neutrality illegal. As he writes at TechDirt:

“That may sound innocuous enough, but “supporting innovation to provide a value-added service” is a coded way of saying that the telcos should be allowed to abandon net neutrality, something confirmed in one of the accompanying proposals… “

The author says the key sentence in this proposal is “Nothing shall preclude commercial agreements with differentiated quality of service delivery to develop.

Comcast network neutrality power grab

Net Neutraility RIPGigaOm says that here in the US Comcast (CMCSA) has created a value-added service. Comcast decided to exempt Xfinity traffic delivered via the Microsoft (MSFT) Xbox from its 250 GBPS/month broadband cap. The U.S. version of network neutrality regulations allows Comcast to exempt that traffic. The loophole is the Xbox traffic doesn’t travel over the public Internet. The anti-net neutrality loophole exists because the FCC didn’t want to deal with the concept of value-added services on an ISP’s network when it made its network neutrality regulations.

rb-

GigaOm calls on the UN and the ITU to open up its process. Maybe then UN member countries will think twice about the types of rules they want to enshrine. Or maybe they’ll keep listening to the people who run the networks instead of the people who use them and depend on them for their businesses.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Credit Agency Trawls Facebook

GigaOm has an article that documents the efforts by Schufa, the largest credit rating firm in Germany to mine data from the Facebook (FB), LinkedIn (LNKD), and Twitter accounts of its customers. David Meyer cites documents leaked to German media, that the firm whose slogan is “We Build Confidence” would use the information “to identify and evaluate opportunities for and threats to the company.

“It cannot be that social networks are systematically scoured for sensitive data, resulting in credit ratings of customers,” said consumer protection minister Ilse Aigner.

rb-

Get over it.

Facebook logoI wrote about firms like RapLeaf mining social networks for employers and banks back in 2010. What is surprising to me and Mr. Meyer is that this latest social network mining operation comes out of Europe and especially Germany, a country where most people are very conscious of data protection concerns.

This goes back to the internet-age-old issue of privacy. Where is the line between public and private is it different for some groups than others? Do the NSA, CIA, MI5, and whoever else is listening get different access to data than Rapleaf, Apple (AAPL), Facebook, Twitter?

Just because the info is out there, public by default do they have the right to use it?

Get over itOn the other hand users of Facebook and Foursquare happily tie their credit cards to these accounts, post status updates, and check in to places for the world to see.  

Maybe we are just getting what we deserve.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.