Slaptijack Title

Archive for 2009

Computer Crime

Along with its ability to enhance collaboration and proliferate information, the Internet has introduced a new level of computer crime. Computer crime consists of a wide array of issues including identity theft and privacy violations, misuse of intellectual property, theft and espionage, and general computer-based attacks. Of the threats facing information systems security, computer crimes […]

Categories: Information Systems

Subscribe to asterisk-announce

If your PBX is Asterisk based, you need to subscribe to the asterisk-announce mailing list. This is where Asterisk developers post information regarding new releases and security updates for all versions of Asterisk. If you were on this mailing list, you would know that two recent security alerts (see below) had forced Asterisk developers to […]

Categories: Voice / Voice over IP

Intellectual Property

Intellectual property is the "ownership of ideas and control over the tangible or virtual representation of those ideas" (FOLDOC, 1997). Many companies have developed intellectual property as part of their normal business operations. This includes manufacturing processes, specialized business operations, and customized software. Intellectual property can be divided into four broad categories: trade secrets, copyrights, […]

Categories: Information Systems

Cisco EoL / EoS Batch #121

Welcome to the Cisco End-of-Life / End-of-Sale Announcement Batch #121. Most Cisco End-of-Life / End-of-Sale announcements include a list of product migration options. If you need help deciding which product is best for you, send me a message.

Categories: Networking

New Technologies: Issues and Challenges

Implementing a new technology is a complicated task. Beyond the technical implementation details, there is a myriad of organizational issues and challenges that must be addressed. Four areas of primary concern including selection of the new technology, implementing it, the human resources implications, and ongoing maintenance. Information systems managers must be aware of how these […]

Categories: Information Systems