Firewall Problems and Solutions

Clark Quinn

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewall Problems and Solutions

Tony Karrer

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done. Never assume your system is secure, never assume there are no bugs, especially if you try to use 'home-brew' crypto. Security is not convenient.

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 232

Is Blockchain the Major Next Step in the Evolution of the Internet

Irving Wladawsky-Berger

To take its major next step, the Internet must overcome three such serious limitations: security, complexity, and trust. Security . Consequently, there’s no one overall owner responsible for security , let alone identity management, over the Internet.

UN’s Internet Governance Forum censors a mild mention of censorship

David Weinberger

A poster for the book — Access Controlled — contained the sentence: “The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China’s famous ‘Great Firewall of China’ is one of the first national Internet filtering systems.&#. Security guards were sent to take the poster down. Holy cow!

The Emerging Data Economy

Irving Wladawsky-Berger

To reach a higher level of privacy and security we need to establish a trusted data ecosystem, which requires the interoperability and sharing of data across the various institutions involved. The Economist’ s May 6 issue referred to data in its cover as the world’s most valuable resource.

Data 202

Micro-blogging can help build your organisational culture

Dan Pontefract

When micro-blogging is brought to fruition inside the organization, safely tucked within the corporate firewalls, the connection can be extremely powerful. The latter may cause some concern from the vantage point of the Chief Security Office.

Why Don’t You Have an Internal YouTube Video Sharing Service?

Dan Pontefract

security. Security issues arise from an organization’s inability to trust their people, thus believing employees would inappropriately share videos and knowledge with those outside the organization and/or firewall.

Video 234

Tear the walls down: Jericho and the future of enterprise tech

Ross Dawson

As Jericho Forum puts it: The huge explosion in business collaboration and commerce on the Web means that today’s traditional approaches to securing a network boundary are at best flawed, and at worst ineffective. Increasingly, information will flow between business organizations over shared and third-party networks, so that ultimately the only reliable security strategy is to protect the information itself, rather than the network and the IT infrastructure.

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. The other major kind of blockchain killer-apps will likely deal with identity management and data security.

Micro-Blogging is Good for Leadership, Good for Your Culture

Dan Pontefract

I personally don’t care what tool, application or technology is being used to drive enterprise-wide micro-blogging, but it must be secure and ideally it’s behind the firewall. If security is sorted out, the risk as I see it is if employees use the tool as a life-casting option.

Reflections on Linux and Mainframes

Irving Wladawsky-Berger

Later that decade, Linux was also widely used in a variety of Internet applications, including web servers and firewall systems. . Especially, I would add, for those transactions that require the highest degrees of security, availability and data privacy.

The Smart Worker : shares what s/he learns

Jane Hart

We need to ensure the privacy and security of our organisation’s content. But if you want to keep the materials as close to the workflow as possible, then other tools are available for in-house, behind-the-firewall, enterprise use. Tweet.

Micro-blogging can help build your organisational culture

Dan Pontefract

When micro-blogging is brought to fruition inside the organization, safely tucked within the corporate firewalls, the connection can be extremely powerful. The latter may cause some concern from the vantage point of the Chief Security Office.

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release. As a consequence, I’ve been doing some interviews, some live, some via email.

State of the Net 2012 – People Tweet Tacit Knowledge – Part One

Luis Suarez

How we may have sold our souls in the name of security, of safety, of our own jobs, essentially, even though that’s no longer anything else than a myth. Job security, that is, specially, in today’s current financial econoclypse.

What Client Must Look for While Choosing a Virtual Repository

Adaptive Path

https://security-online.net/data-protection/ Considering the fact that virtual platforms are becoming more and more demanded, plenty of vendors provide their data rooms on the VDR market. It is supposed to have all the selected certificates (ISO 27001 and SSAE 16), provide strong data encryption, firewalls, 2-step user authentication process, dynamic watermarks, etc.

IT Doesn’t Matter. Business processes do

Jay Cross

Enterprise Application Integration (EAI), the melding of ERP, SCM, CRM, PLM, and what-not into one all-encompassing application, is a major step forward, but it doesn’t link the organization with those outside the firewall such as partners and suppliers.

Learning Organizations, eLearning 2.0 and Edupunk

Clark Quinn

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. It makes sense in many of these cases to keep it inside the firewall. Hopefully, we'll begin to see ways to allow a better handling of inside and outside the firewall solutions.

Transparent work

Harold Jarche

Just compare informal learning on the web with what happens inside the firewall. Use a DIY approach and let the IT department focus on data security not tools. Tweet People are now the engine of change and the fuel is communications, says Jay Deragon in Systemic Impact of Social Technology. System outcomes can be influenced by numerous factors such as: Competitor innovation that attracts the market away from your business. Cost of goods increases and margins shrink.

Connectivity – The Achilles Heel of Remote Knowledge Web Work

Luis Suarez

Open Innovation Re-visited

Irving Wladawsky-Berger

At the time, a number of research institutions and leading edge companies were already using clusters of Intel processors running Linux as a way of building relatively inexpensive, and increasingly powerful supercomputers, as well as highly scalable web servers, distributed file and print servers, network firewalls , and other Internet infrastructure applications.

Business or Pleasure? - why not both: Enterprise 2.0: a simple.

Martijn Linssen

We've spent much time through the years developing systems of roles, rights and security within the enterprise to control flow of information inside the firewall, but I'm astonished by how rarely this is spoken or written of in regards to Enterprise going social, be it vendor or customer.

Beyond the Course

Nigel Paine

Enterprise software is more complex and expensive but is locked, securely behind a firewall and integrate with other existing products. I was asked to speak at a conference in Edinburgh organised by a smart British e-learning company called Brightwave and jointly run with Sky.

Finally a great E20 tool - and people play the social card!

Martijn Linssen

technologies now starting to penetrate the firewall. The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter? Business or Pleasure? -

Tools 159

Learning Organizations, eLearning 2.0 and Edupunk

Tony Karrer

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. It makes sense in many of these cases to keep it inside the firewall. Hopefully, we'll begin to see ways to allow a better handling of inside and outside the firewall solutions.

Increasing “Jointness” and Reducing Duplication in DoD Intelligence

Martijn Linssen

This move was a surprise to many: the stodgy and security conscious IC was moving ahead of many private sector companies with its use of Web 2.0 tools behind the firewall (dubbed “Enterprise 2.0”) to increase knowledge transfer and information sharing.

eLearning Predictions Further Thoughts

Tony Karrer

Some comments: home is better -- @ work there are blocks on our network as to what we can and can't access Firewalls an issue at work Work has faster connections not supposed to access internet at work less network security at most homes, or firewall issues Firewalls at work prevent connections Certainly the issues with access certain sites, e.g., our LearnTrends site that’s hosted by Ning, is an issue.

Models for Learning Questions

Tony Karrer

1) Two issues that come up, at least in the world of training in a government environment, is that of a) security of information, and b) control of the information given to the learner to make sure it is accurate. Security of the information is something that hopefully your IT organization is already dealing with. I recommend adopting their tools and their security mechanisms. We wrapped up our free elearning webinar on Models for Learning in a New World.

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

Reflections from 2011 – A World Without Email – The Documentary

Luis Suarez

( WARNING : I do realise that I have already included a warning and word of caution throughout this article about the length of it, but I thought I would let folks know as well how if you would just want to check out the yearly progress report you would just need to read the first section and move on to other things.

Ten years after

Jay Cross's Informal Learning

Progress has brought us longer hours, less security, more stress, shorter vacations, and unhappy lives on the job. Training” extends outside the firewall. Bionic ID and virtual private networks will make the net secure. Frustrated by firewalls, many employees shifted training activities to their homes. The Information Era has arrived. The Machine Age is over. The rules have changed. The sky has fallen in.

TTI Vanguard Conference Notes - 6

Stephen Downes: Half an Hour

Slide cinnecting MITRE, industry, military, academia) The challenge - a range of security from 'behind the firewall' to 'no securoty', based on information sensitivity. Longish discussion of how the system has different levels of security, isn't cleared for top security (FUOU or whatever), where Sharepoint is used.

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Harold Jarche » Need for collaboration continues to grow

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green? We set up a collaborative space outside the firewall and work with clients in their particular business context.

Coming for your job.or at least the way you do it now.

Mark Oehlert

The tools will are already becoming integrated with your existing enterprise platforms, so they're already inside the firewall. ( photo credit ) I keep telling people that the whole "Web X.0

Content Delivery Networks

Stephen Downes: Half an Hour

At the OS level, Akamai started with Red Hat Linux and, over time, have built in Linux performance optimizations and eventually created a ‘secure OS’ derived from 2003 Linux that is ‘battle hardened’. To optimize security on the server: disk and disk cached are managed directly.

TTI Vanguard Conference Notes - 7

Stephen Downes: Half an Hour

What we're interested in at github is where we take all these ideas, and put them inside a firewall, with permissions, etc., Your reputation is your 'security' (for a loan, transaction, etc.). Chris Wanstrath, Github Collaborative Softwrae Development in teh 21st century We do collaborative software development. This is the way software is usually developed. But a lot of the methods were developed in the 1990s. Linus Torvalds. Linux. Which is everywhere now.

Harold Jarche » Wake up and smell the coffee

Harold Jarche

Rob Wilkins , on November 30th, 2008 at 7:05 Said: Hi Harold, Link is in fact behind a firewall.

PKM 130

2010 in Review Part 3: My year in reflective blogging

Jane Hart

  The first asked, Is banning social media in the workplace the right approach , another – The future of social media in the organisation - pointed out that secure, private behind-the-firewall social systems might be appropriate for some organisations, but they won't be enough for those  who have grown used to having access to the Social Web. Blog C4LPT Jane Hart Advice Workshops Social Learning Handbook Resources Contact Happy Christmas! Happy Holidays!

Review 100

Why do we care about some things and not others? | Daniel Pink

Dan Pink

That takes a coach with a secure ego, and there are probably limits to student self-direction in a school setting due to liability issues, but definitely movement toward self-direction is needed. Dan Pink. Contact. Follow Dan on Twitter. About Dan. Speaking Engagements. Video. Articles.