Web Headlines

Headlines from around the Web for Monday, Feb. 25, 2008
Compiled by Melanie Bender

The Road To Making Business Intelligence Available To Everyone

InformationWeek

For BI to be used by more employees and by employees in a wider range of job types within a company, several roads must converge, and IT professionals must work with businesses more closely to make that happen.

The Challenges of Retrofitting PCs with a Standard Configuration

Government Computer News

While some agencies have made significant progress complying with the Federal Desktop Core Configuration, others -- like the Agriculture Department, where field employees are given administrative rights to their laptops -- are experiencing considerable challenges to quickly complying with the new security rules.

Electronic Recyclers International CEO Explains 'All Things eWaste'

Government Technology

VideoJug, an online video encyclopedia of life that features professionally made 'how-to' and expert advice clips, is featuring chairman and CEO Of Electronic Recyclers International John S. Shegerian in a series of clips on electronic waste, why it is an environmental hazard and how to properly dispose of it.

New Funding to Protect Cyberassets Catches Industry Attention

WashingtonTechnology

Given the current attention the public is paying to cyber espionage and attacks, cybersecurity contractors are expecting a fresh wave of federal business opportunities. However, exact details on opportunities are hard to pin down.

USPTO Reveals Plans for 2008 IT Procurements

Federal Computer Week

The U.S. Patent and Trademark Office plans to issue four requests for proposals for five competitive IT procurements, covering systems and network engineering, database management and help desk support. The potential contracts would replace existing contracts.

The Common Cold of IT Security

Government Computer News

Like the common cold, IT experts find they can treat buffer overflows, but can't cure them. A stack buffer overflow is one of the oldest tricks used by hackers to take control of a computer. When a malicious program writes excess data to an address on the call stack of an application with a fixed length buffer, the corrupted stack can make the application run improperly.

Airlines Shift to E-Ticket Only Starting June 1

The Washington Post

The International Air Transport Association, a trade group representing 240 airlines and accounts for 94 percent of air traffic, announced its members will use only electronic tickets beginning June 1. Emphasizing the bottom line, the IATA spokesman noted how much cheaper e-tickets are to produce than paper tickets. The switch will save the industry $3 billion a year.

Idaho Lawmakers Consider 'Digital Repository' for Documents

The Idaho Statesman

Idaho officials seeks to replace an ineffective, costly and often ignored law requiring 20 copies of each state document be sent to libraries around the state. As so many state documents exist only in digital format, under the new system, one electronic copy of every state publication would go to the state Commission of Libraries to be preserved in the new digital library.

Colorado Airline Passengers Eye Fast Lane

The Daily Camera

The Clear security fast pass has been in use at the Denver International Airport since January. Cardholders bypass the unpredictable waits at airport security stations by registering personal information with the Transportation Security Administration. Thus far, travelers using the service have been pleased with the guaranteed no more than four minutes of waiting at airport security.