SlideShare uma empresa Scribd logo
1 de 21
2008 Collaborated with 	3 Companies and 	2 Universities partners on  	3 projects ,[object Object]
 Motorola (Korea & UK)
 Great Southern Wood (USA)
 Hong-ik University (Korea)
 Auburn University (USA),[object Object]
 Motorola (Korea)
 Hong-ik University (Korea)
 Ohio State University (USA)
 RMIT, University (Australia),[object Object]
The Open ICT Tools
ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP  (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
Why do they do it ? Money
Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
So… We got it hosted externally As demand stabilised we brought it inside

Mais conteúdo relacionado

Destaque

Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 EducationDr.Kumuda Gururao
 
01 Def Dist Ed
01 Def Dist Ed01 Def Dist Ed
01 Def Dist Edallanjeong
 
Week1 lecture rev3
Week1 lecture rev3Week1 lecture rev3
Week1 lecture rev3neuonline12
 
Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress MedicReS
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples PresentationSuzie Vesper
 

Destaque (7)

Top 10 I C T Tools 4 Education
Top 10  I C T  Tools 4  EducationTop 10  I C T  Tools 4  Education
Top 10 I C T Tools 4 Education
 
01 Def Dist Ed
01 Def Dist Ed01 Def Dist Ed
01 Def Dist Ed
 
Week1 lecture rev3
Week1 lecture rev3Week1 lecture rev3
Week1 lecture rev3
 
Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress Cemal H. Guvercin MedicReS 5th World Congress
Cemal H. Guvercin MedicReS 5th World Congress
 
Output devices hafiq
Output devices hafiqOutput devices hafiq
Output devices hafiq
 
Ict Examples Presentation
Ict Examples PresentationIct Examples Presentation
Ict Examples Presentation
 
Tools Of ICT
Tools Of ICTTools Of ICT
Tools Of ICT
 

Semelhante a 07 Open ICT Tools

Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecurityDeja vu Security
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internetsameera.moparty
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Tina Jordan
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...meritnorthwest
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.pptDizzi1
 

Semelhante a 07 Open ICT Tools (20)

Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
The Internet
The InternetThe Internet
The Internet
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Assignment - 01
Assignment - 01Assignment - 01
Assignment - 01
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
P2p
P2pP2p
P2p
 
Wi-Fi File Explorer
Wi-Fi File ExplorerWi-Fi File Explorer
Wi-Fi File Explorer
 
Lec 1
Lec 1Lec 1
Lec 1
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Hacking 05 2011
Hacking 05 2011Hacking 05 2011
Hacking 05 2011
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 
202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt202160902-Internet-Intranet-Extranet.ppt
202160902-Internet-Intranet-Extranet.ppt
 

Mais de BCE A&E

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External EngagementBCE A&E
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCEBCE A&E
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCEBCE A&E
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summaryBCE A&E
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsBCE A&E
 
BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEBCE A&E
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)BCE A&E
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesJisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesBCE A&E
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE A&E
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2BCE A&E
 
09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full VersionBCE A&E
 
Event Programme
Event ProgrammeEvent Programme
Event ProgrammeBCE A&E
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog ProjectBCE A&E
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp EndBCE A&E
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools ProjectBCE A&E
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding BceBCE A&E
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme OverviewBCE A&E
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis ToolsBCE A&E
 

Mais de BCE A&E (20)

Supporting and Enabling External Engagement
Supporting and Enabling External EngagementSupporting and Enabling External Engagement
Supporting and Enabling External Engagement
 
JISC Collections & BCE
JISC Collections & BCEJISC Collections & BCE
JISC Collections & BCE
 
JANET: Supporting BCE
JANET: Supporting BCEJANET: Supporting BCE
JANET: Supporting BCE
 
Embedding BCE: Project summary
Embedding BCE: Project summaryEmbedding BCE: Project summary
Embedding BCE: Project summary
 
Relationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & PitfallsRelationship Mangement: Challenges, Processes & Pitfalls
Relationship Mangement: Challenges, Processes & Pitfalls
 
BCE A&E: How did we get here?
BCE A&E: How did we get here?BCE A&E: How did we get here?
BCE A&E: How did we get here?
 
JISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCEJISC Advance: Services, RSCs & BCE
JISC Advance: Services, RSCs & BCE
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes (Handout)
 
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & OutcomesJisc Advance BCE Evidencing Outcomes Benefits & Outcomes
Jisc Advance BCE Evidencing Outcomes Benefits & Outcomes
 
BCE @ Stirling: Mark Toole
BCE @ Stirling: Mark TooleBCE @ Stirling: Mark Toole
BCE @ Stirling: Mark Toole
 
Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2Jisc access mgmt_scoping_study_v0_2
Jisc access mgmt_scoping_study_v0_2
 
JISC:
JISC: JISC:
JISC:
 
09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version09 Extending It For External Engagement Full Version
09 Extending It For External Engagement Full Version
 
Event Programme
Event ProgrammeEvent Programme
Event Programme
 
06 The G Blog Project
06 The G Blog Project06 The G Blog Project
06 The G Blog Project
 
04 A View From The Sharp End
04 A View From The Sharp End04 A View From The Sharp End
04 A View From The Sharp End
 
05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project05 Trialling Of Collaborative Online Tools Project
05 Trialling Of Collaborative Online Tools Project
 
02 Embedding Bce
02 Embedding Bce02 Embedding Bce
02 Embedding Bce
 
01 BCE Programme Overview
01 BCE Programme Overview01 BCE Programme Overview
01 BCE Programme Overview
 
03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools03 CRM Self Analyisis Tools
03 CRM Self Analyisis Tools
 

Último

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

07 Open ICT Tools

  • 1.
  • 2.
  • 4. Great Southern Wood (USA)
  • 6.
  • 9. Ohio State University (USA)
  • 10.
  • 11.
  • 12. The Open ICT Tools
  • 13. ICT tools to support inter-organisational communication and data exchange ICT tools to support inter-organisational communication and data exchange VoIP (Voice over Internet Protocol such as Skype) Teleconferencing Instant messaging Wikis email Blogs Videoconferencing Interactive Whiteboard Technology Plone FTP
  • 14.
  • 15.
  • 16. Malware 15 years to end 2007 – 358,000 135,000 in 2007 March 2008 > 135,000 End of 2008 – 1.5M (3,500 per day) (Figures from McAfee)
  • 17. What are the dangers ? Keyloggers Get your passwords And your credit card and bank details Your PC becomes a robot Your PC becomes base for new attack
  • 18. How does it happen ? Opening an e-mail attachment ‘OK to install new video codec ?’ Downloading and installing free software Accepting a file using an Instant Messenger Installation through coercion Simply visiting a website
  • 19. Why do they do it ? Money
  • 20. Wikis Initially didn’t integrate with our authentication There would be a training overhead for contributors We would have to set it up and support it Little demand
  • 21. So… We got it hosted externally As demand stabilised we brought it inside
  • 22. Skype Skype got a bad reputation Seen as a threat by network security Its traffic is encrypted Its protocols were kept secret It commandeered PCs for its own purposes
  • 23. So… We initially had a dedicated wireless network We now have it on our normal wireless network If there are no issues we would consider it on main network
  • 24. FTP Huge security risk Do use a bit of Secure FTP (SFTP) Not sensible to open up your systems to allow other people to send you files
  • 25. Instant Messenger We needed a corporate version Self installers use ‘external authentication’ Contacts needs to be self populated
  • 26. So… We chose Office Communication Server Works well internally In the process of installing bridge servers to externals
  • 27.

Notas do Editor

  1. Example of communication complexities
  2. Technological common platform enablingdata exchange and communication between Northumbria students its staff and external partners
  3. Jed to provide the context
  4. Jed to provide the context
  5. There is huge growth in the number of viruses etc. being created