Home
 > search for

Featured Documents related to »  web privacy


Freeware Vendor's Web Tracking Draws Curses
The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was

web privacy  the data collected on web surfers in the normal course of business. It is difficult to blame Comet for using faulty software not part of the operating system, but once the issue became newsworthy, Comet became vulnerable to criticism about the lack of a privacy policy and to questions about why the data were being collected. Comet has probably lost users because of this, because people seem to be especially sensitive about data being collected or used surreptitiously. While few users would have read Read More...
Web Content Management (WCM)
Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or ext...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » web privacy


Why Not Take Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty
Online advertising network 24/7 has acquired AwardTrack, a newly launched provider of loyalty programs.

web privacy  each other. What about web surfers? They should become aware of the implications of joining loyalty programs. Perhaps media feeding frenzies like the one that DoubleClick has been going through will begin the education process. Some people will welcome both the something-for-nothing arrangement of a loyalty points program and the ability to see relevant advertising, which is the most probable use of the information that 24/7 or others will make of this information. The less likely but hardly impossible Read More...
Web 2.0 --
Another buzzword (albeit not another three letter acronym [TLA]) that has slowly (or not) but surely crept into our collective mind is certainly Web 2.0

web privacy  even now? Or, is Web 2.0 a genuine set of technologies that can even provide the richness of traditional desktop applications (read Microsoft Office ) to the Web-based applications, without all the price and/or performance pitfalls/traps that are often associated with Office Business Applications (OBA)? At least we need to keep a close eye on how the next generation of office workers are using social networking sites/communities like Tagging , Facebook , Twitter , Instant Messenger (IM), etc., as they Read More...
Security Risk Assessment and Management in Web Application Security
Corporations are at risk because Web applications and servers make them susceptible to hackers and cyber crooks. However, companies can perform security risk

web privacy  can be critical. Compromised Web servers can damage organizations in many ways, from surrendering customer privacy data and accepting fraudulent transactions, to indirectly damaging corporate prestige as the result of a defaced homepage. While it may seem that a myriad of bad things can happen because of a million different vulnerabilities, we can succinctly categorize the core points of pain to be addressed in your Web security risk management plan in a few primary areas: 1. Default configuration Web Read More...
Microsoft Hopes to Win Over Consumer Privacy Advocates
Microsoft aims to assist users understand privacy issues by embedding privacy agents into its web browser

web privacy  of the World Wide Web Consortium. It specifies a machine-readable language with which websites can encode their privacy policies. This will enable browsers to automatically steer surfers away from sites whose policies do not match the surfer's level of comfort. P3P does not in itself say anything about the kinds of policies sites should adopt. User Recommendations Advertising is what makes the Internet as free as it is. Most users and privacy advocates understand this. Different individuals and groups do Read More...
Off-duty Conduct-Balancing an Employer’s Needs With an Employee’s Right to Privacy
Workplace privacy issues are increasing dramatically, along with related employee complaints and litigation. As companies struggle to control health care costs,

web privacy  duty Conduct-Balancing an Employer’s Needs With an Employee’s Right to Privacy Workplace privacy issues are increasing dramatically, along with related employee complaints and litigation. As companies struggle to control health care costs, increase productivity, and maintain company confidentiality, they become concerned with how employees spend their time away from work. Meanwhile, employees naturally have a strong desire to limit “invasion” of their personal lives. Just where do you draw the Read More...
Understanding SOA, Web Services, BPM, BPEL, and More Part One: SOA, Web Services, and BPM
In the larger schema of things, SOA would espouse general, more abstract concepts of software reusability and encapsulation within certain boundaries (as to

web privacy  SOA, Web Services, BPM, BPEL, and More Part One: SOA, Web Services, and BPM Introduction The battle for the dominance in Service Oriented Architecture (SOA) and Web services has so far largely been a war of words without the clear winner yet (and not any time soon), as many underlying Internet-based standards have emerged only recently. Still, the advocates of both major platforms/frameworks, Java 2 Enterprise Edition (J2EE) and Microsoft .NET , agree on the future of Web services, and have Read More...
New Technology for a Compelling Web Channel Experience: Competition and Social Web Propel Rich Internet Applications
While companies are investing heavily in e-commerce and e-service deployments, the customer is in the driver’s seat. Customers are influenced by the quality of

web privacy  Technology for a Compelling Web Channel Experience: Competition and Social Web Propel Rich Internet Applications While companies are investing heavily in e-commerce and e-service deployments, the customer is in the driver’s seat. Customers are influenced by the quality of the Web sites they visit, and their perceptions are increasingly shaped by their experiences with social networking sites. Learn how companies are working with software vendors to incorporate advanced technologies into its e-commerce Read More...
Data Masking: Strengthening Data Privacy and Security
Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating

web privacy  Masking: Strengthening Data Privacy and Security Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you. Read More...
6 Important Steps to Evaluating a Web Security Solution
Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to

web privacy  Steps to Evaluating a Web Security Solution Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, Read More...
Mirapoint Adds Web-Mail Client to Messaging Appliance Line
Given that the SP can host well over 200,000 mailboxes, the cost of the WebMail Direct option is minimized to approximately .16 cents a mailbox (bringing the

web privacy  her email from any web browser, regardless of whether or not the browser is Java enabled. Market Impact Well, what else is new, everyone else has a web mail client, so Mirapoint does too. But Mirapoint does it with a twist, the WebMail Direct Client will be accessible from any web browser, regardless of Java or frames support. The interface appears to be much like the majority of WebMail clients out there, but is clean, easily navigable and user friendly. One of the key selling points, which Mirapoint is Read More...
Building a Web Application Security Program
Today’s Web applications exist in an environment vastly different from when businesses first entered the Internet. Few companies have a comprehensive Web

web privacy  a Web Application Security Program Today’s Web applications exist in an environment vastly different from when businesses first entered the Internet. Few companies have a comprehensive Web application security program to prevent Internet-borne security breaches. Learn how security concerns for Web applications are different than for traditional applications, and how to build a Web security program that curbs costs and provides effective security. Read More...
Compiere Announcement on its Web-Oriented Open Source ERP
I just saw this announcement about Compiere's 11 new demos. The company is offering a sneak peek of its next generation Web-architecture. While watching the

web privacy  Announcement on its Web-Oriented Open Source ERP I just saw this announcement about Compiere 's 11 new demos. The company is offering a sneak peek of its next generation Web-architecture. While watching the first demo, I notice it really stresses ease-of-use in the interface. Whether others agree that it's easy to use or not, I don't know but, but it is interesting that Compiere publicly asked for feedback in its public forum on the subject. A few days ago I posted about some debates taking place Read More...
Proactive Real-time Monitoring of Real Web Transactions
As the web has evolved from being an information exchange medium to a medium of business transactions, it has become critical for businesses to ensure their web

web privacy  Real-time Monitoring of Real Web Transactions As the web has evolved from being an information exchange medium to a medium of business transactions, it has become critical for businesses to ensure their web sites are available 24x7. And since the user experience is governed by how well site-associated application components perform, effective and proactive monitoring that drills down to the root cause of problems is imperative. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others