Headlines from around the Web for Monday, Feb. 25, 2008
Compiled by Melanie Bender
The Road To Making Business Intelligence Available To Everyone
InformationWeek
For BI to be used by more employees and by employees in a wider range of job types within a company, several roads must converge, and IT professionals must work with businesses more closely to make that happen.
The Challenges of Retrofitting PCs with a Standard Configuration
Government Computer News
While some agencies have made significant progress complying with the Federal Desktop Core Configuration, others -- like the Agriculture Department, where field employees are given administrative rights to their laptops -- are experiencing considerable challenges to quickly complying with the new security rules.
Electronic Recyclers International CEO Explains 'All Things eWaste'
Government Technology
VideoJug, an online video encyclopedia of life that features professionally made 'how-to' and expert advice clips, is featuring chairman and CEO Of Electronic Recyclers International John S. Shegerian in a series of clips on electronic waste, why it is an environmental hazard and how to properly dispose of it.
New Funding to Protect Cyberassets Catches Industry Attention
WashingtonTechnology
Given the current attention the public is paying to cyber espionage and attacks, cybersecurity contractors are expecting a fresh wave of federal business opportunities. However, exact details on opportunities are hard to pin down.
USPTO Reveals Plans for 2008 IT Procurements
Federal Computer Week
The U.S. Patent and Trademark Office plans to issue four requests for proposals for five competitive IT procurements, covering systems and network engineering, database management and help desk support. The potential contracts would replace existing contracts.
The Common Cold of IT Security
Government Computer News
Like the common cold, IT experts find they can treat buffer overflows, but can't cure them. A stack buffer overflow is one of the oldest tricks used by hackers to take control of a computer. When a malicious program writes excess data to an address on the call stack of an application with a fixed length buffer, the corrupted stack can make the application run improperly.
Airlines Shift to E-Ticket Only Starting June 1
The Washington Post
The International Air Transport Association, a trade group representing 240 airlines and accounts for 94 percent of air traffic, announced its members will use only electronic tickets beginning June 1. Emphasizing the bottom line, the IATA spokesman noted how much cheaper e-tickets are to produce than paper tickets. The switch will save the industry $3 billion a year.
Idaho Lawmakers Consider 'Digital Repository' for Documents
The Idaho Statesman
Idaho officials seeks to replace an ineffective, costly and often ignored law requiring 20 copies of each state document be sent to libraries around the state. As so many state documents exist only in digital format, under the new system, one electronic copy of every state publication would go to the state Commission of Libraries to be preserved in the new digital library.
Colorado Airline Passengers Eye Fast Lane
The Daily Camera
The Clear security fast pass has been in use at the Denver International Airport since January. Cardholders bypass the unpredictable waits at airport security stations by registering personal information with the Transportation Security Administration. Thus far, travelers using the service have been pleased with the guaranteed no more than four minutes of waiting at airport security.
NEXT STORY: Outsourcing Hollows Out Fed Tech Workforce