Firewall Problems and Solutions

Clark Quinn

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewall Problems and Solutions

Tony Karrer

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate. These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 180

UN’s Internet Governance Forum censors a mild mention of censorship

David Weinberger

A poster for the book — Access Controlled — contained the sentence: “The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China’s famous ‘Great Firewall of China’ is one of the first national Internet filtering systems.&#. Security guards were sent to take the poster down. Holy cow!

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

To take its major next step, the Internet must overcome three such serious limitations: security, complexity, and trust. Security . Consequently, there’s no one overall owner responsible for security , let alone identity management, over the Internet. Security standards are necessary, but not sufficient. In the Fall of 1995, IBM made the decision to embrace the Internet and make it the centerpiece of its strategic directions.

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.

Tear the walls down: Jericho and the future of enterprise tech

Trends in the Living Networks

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. Increasingly, information will flow between business organizations over shared and third-party networks, so that ultimately the only reliable security strategy is to protect the information itself, rather than the network and the IT infrastructure.

Micro-blogging can help build your organisational culture

Dan Pontefract

When micro-blogging is brought to fruition inside the organization, safely tucked within the corporate firewalls, the connection can be extremely powerful. From a technology perspective, an organisation will have to decide whether to host the micro-blogging platform within its own firewall, or utilise the service of a hosted provider. The latter may cause some concern from the vantage point of the Chief Security Office.

The Emerging Data Economy

Irving Wladawsky-Berger

But while it’s very difficult to compete with the Internet giants in B-to-C applications involving consumer data, the situation might be quite different when it comes to the data needed for B-to-B transactions among companies, and/or for mission critical applications where security and privacy are paramount. The Economist’ s May 6 issue referred to data in its cover as the world’s most valuable resource.

Data 157

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release. As a consequence, I’ve been doing some interviews, some live, some via email.

Why Don’t You Have an Internal YouTube Video Sharing Service?

Dan Pontefract

security. Security issues arise from an organization’s inability to trust their people, thus believing employees would inappropriately share videos and knowledge with those outside the organization and/or firewall. There is also the perceived security issue concerning videos being stored on the cloud for some CIO’s, etc. A few facts about YouTube: 24 hours of content is uploaded every minute.

Video 185

Micro-Blogging is Good for Leadership, Good for Your Culture

Dan Pontefract

I personally don’t care what tool, application or technology is being used to drive enterprise-wide micro-blogging, but it must be secure and ideally it’s behind the firewall. Stand-alone options such as Yammer , Present.ly , Socialcast and Socialwok (amongst others) have cloud-based and internal VPN instances that you can deploy, but again, I argue that you should bring this functionality inside of your organization for reasons concerning intellectual property and security.

Micro-blogging can help build your organisational culture

Dan Pontefract

When micro-blogging is brought to fruition inside the organization, safely tucked within the corporate firewalls, the connection can be extremely powerful. From a technology perspective, an organisation will have to decide whether to host the micro-blogging platform within its own firewall, or utilise the service of a hosted provider. The latter may cause some concern from the vantage point of the Chief Security Office.

Reflections on Linux and Mainframes

Irving Wladawsky-Berger

Later that decade, Linux was also widely used in a variety of Internet applications, including web servers and firewall systems. . In my opinion, the most important part of the announcement is LinuxONE’s support of the advanced encryption features that have been built into the latest mainframes models, enabling them to support up to 8,000 highly secure Linux systems in one machine. .

The Smart Worker : shares what s/he learns

Jane Hart

We need to ensure the privacy and security of our organisation’s content. But if you want to keep the materials as close to the workflow as possible, then other tools are available for in-house, behind-the-firewall, enterprise use. Tweet. This is the 4th in a series of posts about how L&D departments can move forward from their traditional role of creating, delivering and managing formal learning.

What Client Must Look for While Choosing a Virtual Repository

Adaptive Path

https://security-online.net/data-protection/ Considering the fact that virtual platforms are becoming more and more demanded, plenty of vendors provide their data rooms on the VDR market. It is supposed to have all the selected certificates (ISO 27001 and SSAE 16), provide strong data encryption, firewalls, 2-step user authentication process, dynamic watermarks, etc.

State of the Net 2012 – People Tweet Tacit Knowledge – Part One

Luis Suarez

How we may have sold our souls in the name of security, of safety, of our own jobs, essentially, even though that’s no longer anything else than a myth. Job security, that is, specially, in today’s current financial econoclypse.

Learning Organizations, eLearning 2.0 and Edupunk

Clark Quinn

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. It makes sense in many of these cases to keep it inside the firewall. Hopefully, we'll begin to see ways to allow a better handling of inside and outside the firewall solutions.

Transparent work

Harold Jarche

Just compare informal learning on the web with what happens inside the firewall. Use a DIY approach and let the IT department focus on data security not tools. Tweet People are now the engine of change and the fuel is communications, says Jay Deragon in Systemic Impact of Social Technology. System outcomes can be influenced by numerous factors such as: Competitor innovation that attracts the market away from your business. Cost of goods increases and margins shrink.

Beyond the Course

Nigel Paine

Enterprise software is more complex and expensive but is locked, securely behind a firewall and integrate with other existing products. I was asked to speak at a conference in Edinburgh organised by a smart British e-learning company called Brightwave and jointly run with Sky. What intrigued me, initially, was the title: Beyond the Course. Particularly as Brightwave is at the epi-centre of e-learning course development. It is their lifeblood.

Open Innovation Re-visited

Irving Wladawsky-Berger

At the time, a number of research institutions and leading edge companies were already using clusters of Intel processors running Linux as a way of building relatively inexpensive, and increasingly powerful supercomputers, as well as highly scalable web servers, distributed file and print servers, network firewalls , and other Internet infrastructure applications.

IT Doesn’t Matter. Business processes do

Jay Cross

Enterprise Application Integration (EAI), the melding of ERP, SCM, CRM, PLM, and what-not into one all-encompassing application, is a major step forward, but it doesn’t link the organization with those outside the firewall such as partners and suppliers. Ten years ago this May a journalist named Nick Carr stirred up a ruckus with an article in Harvard Business Review claiming that IT Doesn’t Matter.

Learning Organizations, eLearning 2.0 and Edupunk

Tony Karrer

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. It makes sense in many of these cases to keep it inside the firewall. Hopefully, we'll begin to see ways to allow a better handling of inside and outside the firewall solutions.

Connectivity – The Achilles Heel of Remote Knowledge Web Work

Luis Suarez

As more and more of us progress further away from firewalls and internal protected networks into the Open Social Web, I guess we would be saying good-bye to VPNs, but then again, if you have been watching the news over the course of the last few months, and, lately, in the last week or so, you would know how some conversations would still need to take place in a secure, private, protected space, although still open and accessible to everyone concerned (i.e.

eLearning Predictions Further Thoughts

Tony Karrer

Some comments: home is better -- @ work there are blocks on our network as to what we can and can't access Firewalls an issue at work Work has faster connections not supposed to access internet at work less network security at most homes, or firewall issues Firewalls at work prevent connections Certainly the issues with access certain sites, e.g., our LearnTrends site that’s hosted by Ning, is an issue.

Models for Learning Questions

Tony Karrer

1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate. Security of the information is something that hopefully your IT organization is already dealing with. I recommend adopting their tools and their security mechanisms. We wrapped up our free elearning webinar on Models for Learning in a New World.

Business or Pleasure? - why not both: Enterprise 2.0: a simple.

Martijn Linssen

We've spent much time through the years developing systems of roles, rights and security within the enterprise to control flow of information inside the firewall, but I'm astonished by how rarely this is spoken or written of in regards to Enterprise going social, be it vendor or customer. The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter?

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

Finally a great E20 tool - and people play the social card!

Martijn Linssen

technologies now starting to penetrate the firewall. The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter? Business or Pleasure? - why not both Home About Contact Wednesday, 26 January 2011 Finally a great E20 tool - and people play the social card! (Im

Tools 122

Increasing “Jointness” and Reducing Duplication in DoD Intelligence

Martijn Linssen

Home About Complexity Reading List Knowledge Management Reading List Increasing “Jointness&# and Reducing Duplication in DoD Intelligence John 0 comments National Security , Social Media Oct 06 When the Secretary of Defense asks you to do something, you need to heed the call, whether you are in government or not. This move was a surprise to many: the stodgy and security conscious IC was moving ahead of many private sector companies with its use of Web 2.0

Ten years after

Jay Cross's Informal Learning

Progress has brought us longer hours, less security, more stress, shorter vacations, and unhappy lives on the job. Training” extends outside the firewall. Bionic ID and virtual private networks will make the net secure. Frustrated by firewalls, many employees shifted training activities to their homes. The Information Era has arrived. The Machine Age is over. The rules have changed. The sky has fallen in.

TTI Vanguard Conference Notes - 6

Stephen Downes: Half an Hour

Slide cinnecting MITRE, industry, military, academia) The challenge - a range of security from 'behind the firewall' to 'no securoty', based on information sensitivity. Longish discussion of how the system has different levels of security, isn't cleared for top security (FUOU or whatever), where Sharepoint is used.

Reflections from 2011 – A World Without Email – The Documentary

Luis Suarez

And what’s even more exciting is that it’s starting to happen at the right time , for once, because over the course of the last few months we have been exposed to a good number of different relevant reads as to why plenty of knowledge workers keep considering corporate email a time waster , a hindrance of one’s own productivity , or rather costly to the business , not to mention the potential security issues incurred or a rather growing issue of email overload altogether.

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Harold Jarche » Need for collaboration continues to grow

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green? We set up a collaborative space outside the firewall and work with clients in their particular business context.

Coming for your job.or at least the way you do it now.

Mark Oehlert

The tools will are already becoming integrated with your existing enterprise platforms, so they're already inside the firewall. And before you say - "Yeah but my enterprise has security concerns, blah blah blah" Check out JackBe's case study of their work with the Defense Intelligence Agency and then talk to me about security concerns. ( photo credit ) I keep telling people that the whole "Web X.0

TTI Vanguard Conference Notes - 7

Stephen Downes: Half an Hour

What we're interested in at github is where we take all these ideas, and put them inside a firewall, with permissions, etc., Your reputation is your 'security' (for a loan, transaction, etc.). Chris Wanstrath, Github Collaborative Softwrae Development in teh 21st century We do collaborative software development. This is the way software is usually developed. But a lot of the methods were developed in the 1990s. Linus Torvalds. Linux. Which is everywhere now.

Content Delivery Networks

Stephen Downes: Half an Hour

At the OS level, Akamai started with Red Hat Linux and, over time, have built in Linux performance optimizations and eventually created a ‘secure OS’ derived from 2003 Linux that is ‘battle hardened’. To optimize security on the server: disk and disk cached are managed directly. Perceived failures – a lot of people see Akamai in their firewalls and think it’s attacking them, because they never requested anything from Akamai. Physical security is becoming more of an issue.

2010 in Review Part 3: My year in reflective blogging

Jane Hart

  The first asked, Is banning social media in the workplace the right approach , another – The future of social media in the organisation - pointed out that secure, private behind-the-firewall social systems might be appropriate for some organisations, but they won't be enough for those  who have grown used to having access to the Social Web. Blog C4LPT Jane Hart Advice Workshops Social Learning Handbook Resources Contact Happy Christmas! Happy Holidays!

Review 100

Harold Jarche » Wake up and smell the coffee

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green? Rob Wilkins , on November 30th, 2008 at 7:05 Said: Hi Harold, Link is in fact behind a firewall.

PKM 100

Why do we care about some things and not others? | Daniel Pink

Dan Pink

That takes a coach with a secure ego, and there are probably limits to student self-direction in a school setting due to liability issues, but definitely movement toward self-direction is needed. I think coaches and parents and peers can help to form a “firewall” around a team, to create an environment where some of the pressure to perform and negative effects of failure to perform lifted off players, so that it OK to fail sometimes. Dan Pink. Contact.