IT Trends Thursday February 23 2006

Contact the Editor | Sponsor this Newsletter | Subscribe | Change email address | Unsubscribe

In This Issue

OPINION

Feeling Vulnerable?

By Doug Gale

(Terry Calhoun is off this week. His column will resume next week.)

When it comes to vulnerability scanners, know your tools, and clarify your goals—or be sorry later.

“You can be sure of succeeding in your attacks if you only attack places which are undefended. You can ensure the safety of your defense if you only hold positions that cannot be attacked.” —Sun Tzu, The Art of War

As a University of Nebraska Cornhusker football fan, I have always looked forward to the spring game that pits the team’s best offensive unit against the best defensive unit. For network security folks, vulnerability scanning is our version of that spring game. With it, we can attack our own network to find the weaknesses in our defenses. Then we can fix them before we play with a real-world opponent Read more


IT NEWS

E-textbook Demand Slow on College Campuses

Some students miss the days of highlighting and folding page corners. For most, however, the savings just are not enough. (CNN) Read more

Cyberstalking Law Opens Debate on What's Annoying

It's kind of hard to believe, but, yep, our government has passed a new law making it a crime to "annoy" someone over the Internet. (USA Today) Read more

Purdue Police Officers Train to Use Facebook as Tool

Online college student forum will be patrolled by campus cops in effort to reduce internet harassment. (The Purdue Exponent) Read more

Ohio University Might Remove Computers from Dorm Rooms

Don't get too excited. It's just that OU still provides a university-owned machine for residence hall students and kind of wants to get out of that business. (The Post, an independent student newspaper at Ohio University.) Read more

RESOURCES

The Plagiarism Plague

IT is the cause of plagiarism? Or not? The ease with which some kinds of plagiarism can be done using the Web, exposes the web of weak detection and inadequate consequences at many institutions. (Higher Education) Read more

DEALS, CONTRACTS, AWARDS

Oxford and Berkeley Partner for BBC's Climate Change Experiment

Distributed computing experient asks users to download software on their own computers to benefit scientific research. (BBC) Read more


U. Wisconsin Offers Faculty Free Email List Manager

The University of Wisconsin at Madison is offering faculty and staff free email list management software that will let set-up and interact with groups of students, colleagues, and other communities via email lists. The university is subsidizing the software, Lyris Technologies' ListManager, to make it available to faculty and staff at no cost. The school already uses the application to reach more than 900,000 subscribers on 25,000 different lists. Each day, 6,000 email campaigns are initiated by faculty, staff and students, generating more than 175,000 messages daily. "Faculty and staff asked for an easy solution that lets them handle email list development and management," said J'e Tarter, University of Wisconsin, Email List Services Manager.

Thursday, February 23, 2006

Sponsored by:
Today's Lesson from NEC: Dynamic Communication of Information with Potential for Revenue Generation
NEC's Digital Signage Solution - powerful visual communication network that demands attention through effective video-based revenue-generating messages!

When You Add It All Together, the Answer is NEC's Digital Signage Solution for Your Campus!

Click here for details.


Sponsored by:

The Open Enterprise: Mandate for Success
How can companies securely and reliably adapt quickly to change, contain costs and deliver the products, services and support customers demand? Based on a flexible combination of open source and commercial software, the Open Enterprise can cost-effectively help you build, secure and manage your IT infrastructure.

Learn how: Click here for details.


Sponsored by:
Email Security Strategies - What to Plan for in 2006
This year IT will face new, even more potentially damaging email security threats and compliance challenges. Arabella Hallawell, Research VP Gartner offers her views on what technology you can apply to assure that your network is protected from attacks. Make sure that you are ready with the right technology choices - listen to this On Demand webinar.

Click here for details.

NEW PRODUCTS

Mitsubishi Introduces Widescreen HD

Mitsubishi Presentation Products Division, introduced the HD4000U, its first high-definition projector designed for wide-format laptops and imaging applications requiring the 16:9 aspect ratio. (Mitsubishi News Release) Read more

Horizon Wimba Releases Wimba Voice Tools 5.0

This version features a new user interface and new import and export capabilities that make working with audio easier and more flexible. (Horizon Wimba News Release) Read more


Online Resources :

More Resources


Current Topics in Our forums include:
Networking

Collaboration in the Education Space

Mobile Computing

Campus IT Security

Tablet PCs

Discuss with us

Featured