The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of ...
Read More
Translate
How to Ensure That Outsourcing Does Not Adversely Affect US Jobs
Offshore outsourcing is a highly debated topic. It would be nice if we reflect on the reasons that has lead to offshore outsourcing - 1. ...
Read More
Cyberlaw Enforcement
I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations....
Read More
Phishing
Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me...
Read More
Importance of Global Cyber Crime Policies
Cyber-Crime and its big brother - "Cyber-warfare", have so conquered the ever expanding and versatile cyberspace that we need to ...
Read More
Data Mining and USA Patriot Act
I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as...
Read More
Data Mining of Email Traffic Patterns
E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a...
Read More
Wiretapping of US Citizen Internet Usage
First of all, I don't think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11, the i...
Read More
Internet Intelligence Add-ons and Hackers
Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr...
Read More
Using Technology to Combat Terrorism
Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr...
Read More
Student's Free Speech Rights?
Children's legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech adv...
Read More
Filtering Harmful Material in Chatrooms, Blogs and Social Networks
I don't think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social ne...
Read More
Dealing With Legislation on Spyware
Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other...
Read More
Using Spyware for Digital Rights Management
Not at all. Firstly there is no relation between the terminology (Spyware) and what the DRM is intended to do. Something which is Spyware i...
Read More
Using Spyware To Monitor Bad Behavior
Interesting topic isn't it! Usage of Spyware by itself should be made illegal in any case, as it invades privacy. Should a software is ...
Read More
How to Avoid Spyware On The Computer?
Some tips will be - 1. Make a point that one would not visit web sites such as mass advertising web sites as they are usually infectious ...
Read More
Advice For Improved Education System
The educational system should revise the curriculum according to the current technology demands in the society and to build creativity of s...
Read More
OLPC
Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children? Int...
Read More
Effective Direction of Technology in Schools
What can be learned from educational experiences where all students in certain school districts have been given computers? The lesson lea...
Read More
XO Type Laptops
Here is a nice article on what determines the usage of XO type laptops in developing countries - http://www.olpcnews.com/countries/india/ ...
Read More
Reducing Digital Divide
I think OLPC program is making a sincere effort with a clear vision from Negroponte. The idea is that it is not the only means to get rid o...
Read More
Funding a Social Impacts Research
Should funding be available for social impacts research when it is not likely to lead to new innovations? I think we should encourage fun...
Read More
Controlling but Being Open Source
Is there a need for languages (like Java/ActiveX) where a corporation controls the standard but can only modify it in public? Java (SunMi...
Read More
The Free Open Band Spectrum
What protections should the public have regarding access to broadband networks for reception and/or transmission? 700 Mhz band is being d...
Read More
Controlling The Network
Should carriers have the freedom through contracts and licenses to shape how their networks will be used? Again this is an instance of pr...
Read More
Charging a Particular Network Traffic and Usage
Should distributors be allowed to charge differently for different types of traffic? This reminds me of the most common issue - when sho...
Read More
Role of FCC to Bring in Net Nuetrality
Should broadband distributors be regulated as common carriers by the FCC? From the literature and court cases, FCC is less obliged to reg...
Read More
TRIPS agreement
Here is another analysis article on a widely asked question - "Should treaties like the World Trade Organization's TRIPS agreement...
Read More
First to File Policy
Should the US patent process be revised as suggested in S 1145 and HR1908? Here is an interesting analysis article (short and sweet as we...
Read More
Protecting Open Source with Patent Infringement
Here is an short and to-the-point article on a most debated topic that I would want everyone to focus on now - "Should the Linux and O...
Read More
Impact of Software Patents on Innovation
This article is a good resource for those who want to know more about the most raised question – What is the impact of software patents on ...
Read More
Global Legal and Technological Protection Mechanisms
This article is a good resource for those who want to know more about the most raised question – Is there a need for legal and technologica...
Read More
Protecting Intellectual Property
This article is a good resource for those who want to know more about the most raised question – Is there a need to legitimate digital righ...
Read More
Protect Intellectual Property Without DMCA Safeguards
This article is a good resource for those who want to know more about the most raised question – How can the intellectual property communit...
Read More
Modifying Digital Millennium Copyright Act
This article is a good resource for those who want to know more about the most raised question - Should the prohibition in the Digital Mill...
Read More
Data Quality Regulations
This is an interesting article that I would recommend which tries to find some conclusion as how agencies may be controlled on posting bias...
Read More
Is Printing Dead?
The core idea of this article is to comtemplate on a most commonly discussed topic - Does making documents accessible over the web elimina...
Read More
Transparent Government Documents - Is it Possible?
There are so many articles about e-governance, but all these articles stress on what e-governance can do, with little thought on how and wh...
Read More
E-Government Act
This article emphasizes on strategies to make sure that E-Goverment act is implemented and maintained. Research was done from Lexis-Nexis ...
Read More
What Does a CIO Need to Know About Organizational Assumptions revolving IT?
Though Information Technology (IT) is seen as a core enabler of business continuity and competence, it is not always viewed so. I was impre...
Read More
Using Cultural Determinants to Shape Global Business Strategy
This article is based on a research paper that I reviewed recently as included in the reference section. The focus of this article is to dr...
Read More
How to Overcome Competing Commitment
"Competing commitment and how to overcome it" - A review of work done by Kegan R. and Lahey L. L. Overcoming employee resistanc...
Read More
Case Study on Theory of Business (TOB)
Bertelsmann AG is the largest media and entertainment group in Europe and the second largest in the world to U.S. based Time Warner, Inc. B...
Read More
Applying NPV and ROI
Case Study - Guiding IT strategist to evaluate IT Investments: Opportunity A: Your bank is looking at an optical character reco...
Read More
Subscribe to:
Posts (Atom)