Internetworking
Internetworking is the technology that makes it possible to interconnect many disparate physical networks with diverse underlying hardware technologies and make them function as a coordinated...
Simple HTTP log analyzer
Here is a simple light weight HTTP analyzer written in PHP. I wrote this to brush up my skills writing schedulers for a typical LAMP...
How to stop bulk spam emails to my mail account?
If you are not one of the people who have had the bad experience of having your email account being subjected to a bulk spam...
Information Architecture for a web site – Sample Web site Concept Draft
XYZ Company Web Site Concept Draft “Becoming industry’s premier outsourcing solution for managed care services” Overview For the past decade, xyz.coom (fictitious) has been the major online...
Ideals of Openness, transparency Vs confidentaility, secrecy
There is great effect of privacy / individual rights on true e-Government implementations. As always, the core goals of e-Governance initiatives are to bring about...
What measures need to be taken to make sure that offshore outsourcing does not adversely affect American jobs?
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing – 1....
Where should cyberlaw enforcement be centered?
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this...
How Pervasive is Phishing?
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing...
Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?
Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and...
USA Patriot Act and Data mining
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other...
What limitations should be imposed on datamining of email traffic patterns?
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy and result oriented when...
Should wiretapping of US citizen internet usage require a warrant?
First of all, I don’t think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11,...
Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Using Technology to combat terrorrism?
Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet...
Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?
Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out...
Can filtering protect children from harmful material in chatrooms, blogs, and social networks?
I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be...
Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to...
Should spyware be allowed for digital rights management, as exemplified by Sony and Microsoft practices?
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware is...
Should parents, employers, and government be allowed to use spyware to monitor for bad behavior?
Interesting topic isn’t it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is used for...
What non-regulatory practices can users follow to reduce the incidence of spyware on their computers?
Some tips will be – 1. Make a point that one would not visit web sites such as mass advertising web sites as they are...
A revolutionary supposition – Advice for improved Education system
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of students. I think the...
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?
Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” –...
What implementation plans should countries make before entering into contracts to purchase low-cost computers?
Here is a nice article on what determines the usage of XO type laptops in developing countries – http://www.olpcnews.com/countries/india/ . The article can be used...
Should funding be available for social impacts research when it is not likely to lead to new innovations?
I think we should encourage funding on social impact research as it would lead us to explore and find answers to long disputed or rather...
Is there a need for languages (like Java/ActiveX) where a corporation controls the standard but can only modify it in public ?
Java (SunMicroSystems) and ActiveX (Microsoft) are two major technology platforms that has evolved itself a long way from years of R & D and support...
What protections should the public have regarding access to broadband networks for reception and/or transmission?
700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap...
Should carriers have the freedom through contracts and licenses to shape how their networks will be used?
Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining...
Should distributors be allowed to charge differently for different types of traffic?
This reminds me of the most common issue – when should government leave the publishing of information to the private?. Intended quality and convenience of...
Should broadband distributors be regulated as common carriers by the FCC?
From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject...
Modifying World Trade Organization’s TRIPS agreement?
Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries...
Should the Linux and Open Source communities be protected from software patent challenges?
Here is an short and to-the-point article on a most debated topic that I would want everyone to focus on now – “Should the Linux...
Impact of Software Patents on Innovation in the Software Industry
This article is a good resource for those who want to know more about the most raised question – What is the impact of software patents...
Need for Legal and Technological Protection Mechanisms
This article is a good resource for those who want to know more about the most raised question – Is there a need for legal and...
How can the intellectual property community protect their intellectual property without the DMCA safeguards?
This article is a good resource for those who want to know more about the most raised question – How can the intellectual property community...
Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?
This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital...
Can data quality regulations be used to keep agencies unbiased in their postings?
This is an interesting article that I would recommend which tries to find some conclusion as how agencies may be controlled on posting biased or...
Does making documents accessible over the web eliminate the need for printing documents?
The core idea of this article is to comtemplate on a most commonly discussed topic – Does making documents accessible over the web eliminate the...
Implementing E-Government Act
Article...
M-Commerce? How could your company take liverage out of it?
Its my pleasure to introduce you to the emerging world of m-commerce and how your company can take a competitive edge by harnessing this technology...
“Cognitive Dissonance” and how to ease it
Cognitive dissonance is an insecure feeling, or lingering doubts, consumers sometimes have after making large purchases. One way to reduce Cognitive dissonance (CD) is to...
Simple NPV & ROI calculation (Example 001)
Case: A company invests $15000 and receives a $11000 cash benefit at the end of the first year and a $12100 cash benefit at the...
Personal Internet Usage at Workplace
As a Director of Security for your organization, what policies or plans could you implement that might help control or diminish personal Internet use at...