DEPARTMENT: Editorial pointers
DEPARTMENT: News track
DEPARTMENT: Hot links
COLUMN: Security watch
The ever-changing nature of technology contributes to the problems encountered by experts when collecting and preparing digital evidence for courtroom presentation.
COLUMN: Digital village
Identifying and defending against port-related vulnerabilities.
COLUMN: President's letter
DARPA's grand challenge spurred advances in the application of AI and, ironically, acted as a referendum on its de-emphasis on academic research.
To help students understand the art of research and the reliability of sources in the age of online information, we should teach them about the nature of `truth'.
SPECIAL ISSUE: The semantic e-business vision
Much work is required to understand how the conceptualizations that comprise business processes across the extended enterprise can be captured, represented, shared, and processed by both human and intelligent software agents. …
The Web infrastructure offers businesses a way to partner and work together, integrating differing applications and communications in a seamless manner.
Strengthening security within the domain of shared knowledge is a critical issue, and great challenge, to businesses today. A number of different protocols currently available offer an array of benefits and limitations.
Finding an effective method for managing and evaluating the performance of business processes is a key element for e-business success.
Moving online business processes and practices from a static collection of data to a distributed multiprocessing framework of interoperability.
Meshing formal business processes with informal human collaborations is needed to support business activities.
Developing secure semantic e-business applications requires focusing first on securing the Semantic Web, knowledge management, and e-business processes.
Coupling business and IT models provides a top-down business perspective.
The human meaning of domain names attracts conflict over their control, degrading their reliability as permanent handles. Solution: support handles separately from names.
Agile project management lets software project managers and employees alike adapt to changing circumstances, rather than try to impose rigid formal controls, as in traditional linear development methods.
Seeking to enhance communication systems by adding expressive cues.
Assessing the contribution of a technical skills management tool for supporting organizational learning.
Biometrics are a promising technology for improving security, if they can overcome technical and social challenges.
Using critical data and predictive modeling can help identify high-risk candidates in a total health plan population.
Developing nations need a technology jumpstart—via basic technologies geared toward education, farming, and health care.
COLUMN: Inside risks