Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
eBook: The Mobile Explosion--This Isn't Your Father's Internet Sponsored by Nokia
Every day, the Internet goes from being less of a luxury to more of a necessity for all of us. The worldwide growth of Internet usage combined with the nearly equal growth in mobile phone usage, more and more people will find the need to access the Internet through their mobile device. Learn how the mobile Web is evolving, the tips and tricks you'll need to go mobile, as well as the basics of what you need to get started on the mobile Internet.
»
eBook: Mobile Email and IM--A Strategic View
Sponsored by Nokia
This ebook examines the basics of what you need to know about workplace emails and instant messaging to help you understand what you're dealing with when you go mobile. It looks at the marketplace to show how mobile communications is poised to take off and discusses what you need to consider for implementing mobile email and IM in your enterprise.
»
How To: 7 Steps to Network Access Control Sponsored by HP
Network access control helps ensure that only authorized users get access to the network. Furthermore, it ensures that users are granted access to only the network resources that they are authorized to use. Learn why it is essential that enterprises effectively administer network access depending on rights and needs.»
Whitepaper: Secure File Transfer In the Era of Regulatory Compliance
Sponsored by Ipswitch
Increasing regulatory compliance mandates such as HIPAA, Sarbanes-Oxley, PCI DSS, BASEL II and J-SOX are compelling companies to establish a management strategy that includes the file transfer process. Learn how a Secure File Transfer approach can help companies meet the challenge of safely and reliably exchanging electronic business information.
»
Identity and Homeland Security
Issues of identity are prominent in U.S. plans to stregthen security at the nation's border and transportation systems. Programs such as US-VISIT include databases and biometrics in an effort to verify the identity of individuals traveling to and within the United States.
Report: TJX Security Was 'Inadequate' By Stuart J. Johnston -
Published September 27, 2007
Retailer faulted for collecting too much information, keeping it too long, and not upgrading security systems quickly enough. [more Inside ID]
IronPort OS Gets Encryption Update By Sean Michael Kerner -
Published September 21, 2007
New core operating system for IronPort's platforms adds encryption and better data-loss prevention technology to e-mail security. [more Inside ID]
Tiers of Trust To Offer IDs In a Crisis By Sean Michael Kerner -
Published September 13, 2007
When terror or natural disaster strikes, how do you make sure that the first responders are on the scene? [more Inside ID]
Cybersecurity: Laws Only Go So Far By Sonny Discini -
Published September 6, 2007
U.S. Government is finally taking cybersecurity seriously in the form of new legislation but businesses shouldn't expect it to become a cure-all. [more Inside ID]
Bet You Don't Know Who I Really Am By Clint Boulton -
Published August 29, 2007
When it comes to the Internet, consumers' finances are cannon fodder for opportunistic thieves. [more Ecommerce]
Can Ask.com Capitalize On Next 'Gen of Search? By David Needle -
Published August 22, 2007
CEO of Ask.com says tapping the collective is key. Also: "Privacy is important and people want to know you aren't doing anything to harm them." [more Inside ID]
From Russia With Larceny By Andy Patrizio -
Published August 7, 2007
Latest malware kit can integrate itself into your browser to mimic your online banking site, and you'd never notice the change. [more Inside ID]
RFID Starts Making More Sense By Jennifer Zaino -
Published July 23, 2007
The technology is finding a home in industries beyond retail, but some still struggle with cost and whether RFID really is better than existing automatic identification systems. [more Inside ID]
Explorer, Firefox Take Heat By Sean Michael Kerner -
Published June 6, 2007 UPDATED: Security researchers claim a number of zero-day flaws in both Internet Explorer and Mozilla Firefox. [more Inside ID]
Microsoft Aims for 'Identity Metasystem' By Stuart J. Johnston -
Published May 24, 2007
Company sponsors open source projects to help link the Web's identity infrastructure, makes ID specification free.
[more Inside ID]
Does IT Certification Matter Anymore? Published May 11, 2007
The value of IT certification changes as technology changes, so it benefits tech workers to stay current with employers’ attitudes toward certs. [more Inside ID]
Teens Are Protecting Themselves Online By Nicholas Carlson -
Published April 20, 2007
What, you thought the kids driving YouTube, MySpace, and
Facebook wouldn't understand how to work privacy preferences?
[more Inside ID]
The Secrets of Laptop Encryption By Dr. Eric Cole -
Published April 10, 2007
A leading security expert details the critical lessons that the industry has learned about using encryption. [more Inside ID]