Show of 4-19-2003

  • Five Biggest Trends in Tech According to Forbes
    • Standardization for low cost hardware and software
    • Open source software for reliable, secure, low cost code
    • Wireless networking for the home and for the last mile
    • Database driven web technology for integration e-business applications
    • Selling software as a service as application service provider
  • The Art of War by Sun Tzu
    • Sun Tzu paraphrased, ?The general who sees the battlefield more clearly than the opponent, can respond to developments faster than the opponent, and can do it in a way not seen by the enemy, will prevail.?
    • This is accomplished by getting the right information to the right people at the right time.
    • Information Technology is central to this process (Information Centric Warfare)
    • IT has also invaded B-schools?..responsible for e-business thrust
  • Cadets train for cyber-warfare
    • The Cyber Defense Exercise conducted this week among the nation’s service academies is a new kind of drill to prepare a new kind of military.
    • The third annual drill, which ran Monday through Thursday, included computer specialists from the three major military academies as well as institutions like the U.S. Coast Guard Academy.
    • At West Point, a "blue team" of a few dozen cadets faced off against a "red team" of hackers from the National Security Agency
  • War video games take over sales charts
    • Combat-themed video games dominated the U.S. sales charts in early April
    • NovaLogic’s "Delta Force: Black Hawk Down" topped the list of best-selling PC games
    • In four of the last five weeks, fully 50 percent of the top games list has been either stand-alone war games, or add-on packages for existing war games.
    • Holding the No. 2 spot Electronic Arts Inc. with "Command & Conquer: Generals
    • Responding to criticism that it was trying to take advantage of the Iraq war for commercial gain, Sony Corp said on Wednesday it will not use the phrase "shock and awe" for PlayStation videogames made by a subsidiary.
  • 10th Anniversary of the Browser
    • April 22, 1993 Mosaic was released by the University of Illinoiss? National Center for Supercomputing Applications.
    • Marc Andreeson was on that student design team.
    • Mosica 1.0, was the first graphic browser and spanned Netscape Browser.
    • Impact of that application cannot be overstated.
  • Internet Security Alliance
  • Penetrating the Great Wall of China
    • Voice of America broadcasts has commissioned software that lets Chinese Web surfers sneak around the boundaries set by their government.
    • The software enables PC users running Microsoft’s Windows XP or 2000 operating systems to set up a simple version of what’s known as a circumvention Web server, or a computer that essentially digs a tunnel under a firewall set up by a government, corporation, school or other organization.
    • The government has blocked popular search engines. In one U.S. study, China was found to be blocking 19,000 Web sites including those providing news, health information, political coverage and entertainment
    • The software, which uses Secure Sockets Layer (SSL), lets the person who installs it set up a miniature Web site through which a firewall-restricted surfer can access the rest of the Web.
    • Haselton on Wednesday posted instructions on how to use the software on his Peacefire Web site.
  • "We Love the Iraqi Information Minister"Website Is Very Popular
    • WeLoveTheIraqiInformationMinister.com devoted to Iraqi Information Minister Muhammed Saeed al-Sahhaf
    • "It was as if a Monty Python character had been parachuted into the lobby of the Palestine Hotel," according to webmaster.
    • Selected quotes from Information Minister:
      • "There are no American infidels in Baghdad. Never!"
      • "My feelings – as usual – we will slaughter them all"
      • "Our initial assessment is that they will all die"
      • "I blame Al-Jazeera – they are marketing for the Americans!"
      • "God will roast their stomachs in hell at the hands of Iraqis."
      • "They’re coming to surrender or be burned in their tanks.?
  • New Security Standards for Managers
    • Security is on every IT manager?s priority list, but what is security and how can executives measure and promote their efforts?
    • The initiative aims establish practical guidelines that draws on corporate experience with accounting principles.
    • Information releases at the RSA 2003 Conference
    • The Generally Accepted Information Security Principles (GAISP) are intended to be a set of guidelines similar to the Generally Accepted Accounting Principles (GAAP) that U.S. corporations follow when they submit their financial reports. GAISP will include a set of procedures by which any company can derive its own security architecture.
    • The industry group promoting the principles, Information Systems Security Association (ISSA) , will pitch GAISP as a badge of honor that companies can use to boast that they are secure.
    • The work began in 1990 under the name GASSP (Generally Accepted System Security Principles), and draws on other work including IS 17799, the standard for a security code of practice from the International Organization for Standardization (ISO), which was originally developed by the British Standards Institute.
  • FTC Files Suit Against Sender of Porn ‘Spam’
    • The Federal Trade Commission is suing one of the country’s most active purveyors of pornographic junk e-mail, part of a stepped-up push by the agency to combat spam.
    • The lawsuit, filed Tuesday in federal court in Illinois, alleges Brian D. Westby of Missouri violated federal laws by sending e-mail whose deceptive subject lines, such as "What is wrong?" and "Fwd: You may want to reboot your computer," camouflaged the actual content: images of scantily clad women and links to 20 porn Web sites Westby operated, many of them featuring "married but lonely" women.
    • FTC officials said its spam database, which is receiving about 120,000 e-mails per day forwarded by citizens, collected 46,000 from Westby’s various endeavors.
    • The agency further alleged Westby used "spoofing" — a common spammer practice that disguises the Internet address of the computer that sends the spam — and provided a means of unsubscribing from e-mail lists that did not work.
  • Stratford News
    • Masters in Telecommunication Systems
    • Enterprise Business Management
    • Bachelors in Hospitality Management, Business Administration, Information Mangement
    • Next Start May 27th
    • Open :House May 10th
      • Tech Talk and Ric Edelman
      • IT Demos (Wireless, Security, Computer Clinic)
      • Hospitality Demos