WIPO Director General Francis Gurry said the central question facing the evolution of copyright policy is how to maintain a balance between availability of cultural works at affordable prices while assuring a dignified economic existence for creators and performers. Digital technology is having a radical impact on those balances. “Rather than resist it, we need to accept the inevitability of technological change and to seek an intelligent engagement with it.”
Archive for 2011/03/20
These organizations have been accepted into Google Summer of Code 2011 and have completed their organization profiles: http://socghop.appspot.com/gsoc/program/accepted_orgs/google/gsoc2011
Google Summer of Code is a global program that offers student developers stipends to write code for various open source software projects. We have worked with several open source, free software, and technology-related groups to identify and fund several projects over a three month period. Since its inception in 2005, the program has brought together over 4500 successful student participants and over 3000 mentors from over 100 countries worldwide, all for the love of code
‘Smart’ threats now come embedded in the data part of the internet packets. A quick shift from shallow packet inspection to deep packet inspection (DPI) is the need of the hourPosted: 2011/03/20 in Cybercrime, Education / Awareness, Tech Evolution
In a blog entry, the network acknowledges that its filter has sometimes restricted more than just the adult content sites it was designed to block.
BluePrint Data uses people to complete 100% of its website and URL reviews and since July 2010 has completed all new URL Reviews using multiple reviewers to independently ensure the categories match prior to the information being added to the master URL Review database. BluePrint Data is the only Internet Filtering supplier offering a Zero False Positive GuaranteePosted: 2011/03/20 in Blocking, Education / Awareness, Filtering, Tech Evolution
BluePrint Data, the leader in high quality OEM internet content filtering solutions with the largest database of exclusively human reviewed website reviews (aka URL reviews), provides its OEM Web Filtering technologies and URL filter database to Internet Security manufacturers or providers (including VARs, Resellers, and others) that source their Internet Web Filtering databases and technologies from OEM providers such as McAfee/Secure Computing, RuleSpace, or WebSense/SurfControl. It is the only Internet Filtering Company to uses a minimum of two human reviewers to categorize each website. Using trained people to review website content not Bots or automated technologies enables BluePrint Data to ensure the most accurate product available enabling them to offer the industries only Zero False Positive Guarantee.
“The addition of nine additional Languages to our Website reviews is valuable service to our existing partners and customers and we look forward to offering it to future customers and partners” said Bob Dahlstrom, BluePrint Data’s CEO. “We strongly believe this can help make the Internet safer and it offers a new value-add to our Internet security products and services”.
BroadHop and Saudi Telecom Present on Unique Policy 2.0 Service Deployment at Management World Middle EastPosted: 2011/03/20 in Bandwidth Management, Blocking, Education / Awareness, Filtering
As a key operator in the region, STC offers a diversified set of network access capabilities to its customers via xDSL, FTTx, WiMAX and GPRS/3G and upcoming LTE services. By using Policy 2.0, STC has been able to monetize subscriber traffic streams, enhance the subscriber user experience, offer personalized services as well as control the explosion of bandwidth growth within its network.
Websense is being used by tens of thousands of companies for content security protection and for the Triton solutions offered by the company. Frost & Sullivan gave Websense the 2010 Global Market Share Leadership of the Year Award for content filtering products.
The company displayed its newest version of a Facebook security app called “Defensio.” New features were put in the latest version of the app, which protects “corporate brand presence and properties on the social Web”. “The Defensio technology protects companies’ brands, their reputation, their customers, and prospects on their Facebook page by analyzing and classifying user-generated content posted to their pages.”
That’s the debate that’s been sparked by comments made by Culture Minister Ed Vaizey at an event held by the IWF.
Vaizey praised the watchdog, which asks ISPs to block sites that feature child abuse images, saying it was a “model” for self-regulation. That raised eyebrows, as Vaizey and his Government are currently looking at ways of dealing with illegal file-sharing and potentially filtering pornography.
Can – or should – the IWF model of take-downs without a court order be used for other web content? We spoke to the IWF’s CEO Peter Robbins.
User-friendly file hosting services are being exploited by paedophiles to exchange images and videos as they attempt to bypass blocks on child abuse websites, according to an internet watchdogPosted: 2011/03/20 in Blocking, Education / Awareness, Stats / reports
“We are now witnessing a surge in images and videos being posted to ‘one-click’ free or inexpensive file hosting sites,” said Peter Robbins, chief executive of the IWF.
Unified has a software program that monitors Internet use and can provide details on each person’s utilization and can literally track down to the second the time spent on each site, Forney said. The company uses this software daily to gauge the activity of web usage and have the ability to block targeted web sites, which the company imposes as necessary.
“We do understand that many employees may possibly need to check certain web sites, such as checking a bank balance, their child’s school website, look up a telephone number, etc,” she said. “We do not impose restrictions on our employees’ accessing those sites on an occasional basis. But, as we know, it’s easy to get caught up drifting from one place to another and spending more time than originally intended. That is why we have these tools available; just in case someone struggles with restricting their use of the Internet.”