CNN: The US Department of Defense plans to add more sites on the Internet to provide information to a global audience …
Defense Department Approves Army’s Deviation Request
Halliburton confirmed that the AFSC has informed KBR that the AMC has approved AFSC’s request for a deviation from the FAR clause.
MBA Launches Blogger Legal Defense Project
As bloggers increasingly face the ire of corporate lawsuits (witness Apple’s recent maneuvers) and until the courts set a precedent, there is an opportunity for the legal community to rally to assist bloggers in defending themselves.
In Defense Of DMOZ
Last week, Murdok featured an article concerning the submission/approval process of the Open Directory Project, DMOZ. Featured in the article were comments from various forums about negative experiences people had while waiting for their site to be accepted or denied. After the article was posted, there were immediate reactions, pro and con, concerning DMOZ, editors, and the approval process.
In Defense of Unix (and Linux, of course)
Warning: This article contains strong language and unpopular opinions. Reading of this material by Windows advocates may cause severe gastric distress followed by a desire to strike the author sharply about the head. As the author does not enjoy being pummeled, such persons are kindly requested to return whence they came and do something else.
An Emergency Fund: Your First Line Of Defense
Downsizing, rightsizing, forced retirement, layoffs, firings, outsourcing, and being made redundant.
Defense In Depth – A Layered Approach Network Security
External information access from partners and employees is a very important aspect in the design of security. Corporations need to be assured that their critical servers are safe from different internet threats. Additionally, because the Web is worldwide, it is impossible to create a global agreement on what traffic is inappropriate and how that traffic should be regulated. A major problem IT departments face is how to defend critical servers from hostile network traffic and network addresses. How do we add layers of security to protect our internet servers and internal systems?