IAPP İstanbul KnowledgeNet 2012

IAPP, İstanbul Bilgi Üniversitesi ve Sabancı Üniversitesi tarafından ortaklaşa düzenlenen Kişisel Verilerin Korunmasına ilişkin Konferansa ilişkin röportajlar için bkz.



"First IAPP İstanbul KnowledgeNet" başladı. 30-31 Ekim 2012 tarihlerinde İstanbul'da yapılacak olan Konferansın ilk günü açılış konuşmaları ve networking'e ayrıldı.

İstanbul Bilgi Üniversitesi Hukuk Fakültesi Öğreitm Üyesi Dr. Nilgün Başalp ve Sabancı Üniversitesi Öğretim Üyesi Dr. Yücel Saygın tarafından konferansa ilişkin açıklamaları takiben Tene&Associates Genel Müdürü Ömer Tene ve IAPP Europe Sorumlu Müdürü Rita di Antonio tarafından kısa açılış konuşmaları yapıldı.

Keynote konuşmalarının yapıldığı bölümde ise Adalet Bakanlığı Kanunlar Genel Müdürü Yüksel Hız tarafından "Yeni Kişisel Verilerin Korunması Hakkında Kanun Tasarısı"'nın değerlendirildi. Benim yaptığım konuşmanın içeriği ise "Veri Koruması Yasa Tasarısının Türkiye'nin Global Rekabet Gücü Açısından Önemi"'ne ilişkindi.

Halihazırda Başbakanlık'ta bulunan Kişisel Verilerin Korunması Hakkında Kanun Tasarısı'nın kamu, özel sektör, akademi ve sivil toplum temsilcileri ile detaylı olarak tartışılacağı 3 panel ise yarın gerçekleştirilecek.

Netherlands Highways Will Glow in the Dark Starting Mid-2013


A smart-road design that features glow-in-the-dark tarmac and illuminated weather indicators will be installed in the Netherlands from mid-2013.

“One day I was sitting in my car in the Netherlands, and I was amazed by these roads we spend millions on but no one seems to care what they look like and how they behave,” the designer behind the concept, Daan Roosegaarde, told Wired.co.uk. “I started imagining this Route 66 of the future where technology jumps out of the computer screen and becomes part of us.”

The Smart Highway by Studio Roosegaarde and infrastructure management group Heijmans won Best Future Concept at the Dutch Design Awards, and has already gone beyond pure concept. The studio has developed a photo-luminising powder that will replace road markings — it charges up in sunlight, giving it up to 10 hours of glow-in-the-dark time come nightfall. “It’s like the glow in the dark paint you and I had when we were children,” designer Roosegaarde explained, “but we teamed up with a paint manufacturer and pushed the development. Now, it’s almost radioactive”.

Special paint will also be used to paint markers like snowflakes across the road’s surface — when temperatures fall to a certain point, these images will become visible, indicating that the surface will likely be slippery. Roosegaarde says this technology has been around for years, on things like baby food — the studio has just upscaled it.

The first few hundred metres of glow-in-the-dark, weather-indicating road will be installed in the province of Branbant in mid-2013, followed by priority induction lanes for electric vehicles, interactive lights that switch on as cars pass and wind-powered lights within the next five years.

The idea is to not only use more sustainable methods of illuminating major roads, thus making them safer and more efficient, but to rethink the design of highways at the same time as we continue to rethink vehicle design. As Studio Roosegaarde sees it, connected cars and internal navigation systems linked up to the traffic news represent just one half of our future road management systems — roads need to fill their end of the bargain and become intelligent, useful drivers of information too.

“Research on smart transportation systems and smart roads has existed for over 30 years — call any transportation and infrastructure specialist and you’ll find out yourself,” Studio Roosegaarde communications partner Emina Sendijarevic told Wired.co.uk. “What’s lacking is the implementation of those innovations and making those innovations intuitive and valuable to the end-consumers — drivers. For this, a mentality change needs to take place within a country and its people, but also within a company such as Heijmans.

“This is a story that goes beyond the ‘Smart Highway’ as such — it’s about the fact that Heijmans and Roosegaarde are not going to wait any longer for innovations to find their way through the political system, but will start building this highway now.”

All together, the studio has around 20 ideas that will eventually be rolled out and it has had inquiries from countries across the globe — “India is really keen on it; they have a lot of blackouts there, it would be hallelujah to them”.

Roosegaarde also hopes to take his designs to the US west coast, where companies like Google already have autonomous vehicles driving round their campuses: “It amazes me that most innovation in the west coast is screen based — I always imagined that technology jumping out of our screens and becoming part of our environment. It’s incredibly important we keep imagining what our reality is going to look. A lot of people have told me along the way that what I wanted could not be done, and it’s my job to prove them wrong.”

The Roosegaarde design promise comes as UK authorities announce that lights on motorways, residential streets and footpaths will be turned off or dimmed from as early as 9pm to save money (hundreds of thousands of pounds, in some cases) and to meet green targets.

Some councils are, however, taking on the burden of installing new lights with dimmers, the cost of which will mean they will need to wait four to five years before they recoup the money — by which time, they could have conserved cash for more efficient and safer ways to save on lighting costs. A Sunday Telegraph report has also revealed that nearly 5,000km of motorways and trunk roads in England are already unlit, 75km have their lights switched off between midnight and 5am and 73 percent of 134 councils surveyed switch off or dim lights, or plan to. Fully switching the lights off on major roads saved the Highways Agency just £400,000 in 2011.

Paul Watters, head of roads policy at the AA, told the Telegraph: “We do know that most accidents happen in the dark. It’s also comforting for people, especially if they arrive back from somewhere in the night, when they have got a late train. There are also suggestions that it increases crime. So it may save money in terms of energy but then you have to look at the cost in terms of security, safety and accidents, it may actually be more.”

According to a report by car insurance company Zurich Connect, there is an 11 percent increase in claims immediately following the winter clock change in the UK, when nights get darker earlier.



E-Invoicing News 2012-5
October 2012

In This Issue
1. Some impressions from the recent event season
2. UN/CEFACT CII & the new PDF/A-3 ISO standard for Germany and others?
3. EXPP Summit 2013 in Warsaw

1. Some impressions from the recent event season
During the past 6 weeks I participated in several events in France, Germany, Poland, the USA and Switzerland. It is exciting to see that E-Invoicing is increasingly being recognized as a great opportunity for optimizing internal processes, collaborating with trading parties and for cutting costs. A great deal is happening right now and E-Invoicing activities are in progress everywhere.
In Europe, “E-Invoicing” tends to be holistic in its approach to paperless collaboration between suppliers and buyers of all sizes. The market drivers are the key stakeholders in private industry, the more than 500 operators of E-Invoicing networks, and also, increasingly, the public sector. E-Invoicing in Europe has already become a multi-billion Euro industry and the growth rates for the coming five years are expected to remain at a sustainable high level. The solid growth rates in the private sector will be supported by several government programs. In line with the Digital Agenda of the European Commission, national governments have defined their objectives regarding the proportion of E-Invoicing within their own administrations. The federal administrations in Denmark, Finland and Norway receive already today (almost) all invoices electronically. Other administrations, for example in Austria, Belgium, France, The Netherlands and Switzerland, as well as the European Commission, have enabled their administrative units to process invoices electronically. Several federal administrations have also defined their objectives regarding electronic invoicing proportions, e.g. Austria (100% from January 2014), Belgium (50% in 2015) and The Netherlands (80% in 2014). Switzerland plans to take things even further than the federal administration inbound scope with 100% of all federal levels (including states and municipalities) due to become enabled for In- and Outbound E-Invoicing in 2016.
The events in Charlotte and in Las Vegas confirmed that, as regards its focus and development, the US market is quite different to the European one. The main focus of large enterprises is on internal optimization of the organisation, regardless of whether the exchange of invoices is paper based or electronic. Applications for the automation of AR/AP processes therefore still tend to dominate, rather than exchange via E-Invoicing network operators. E-Invoicing is mainly seen as one feature of the AP automation and has a long way to go before it becomes a multi-billion industry. Features tend sometimes to be free.
E-Invoicing is an international topic. This was very evident during the EXPP Summit in Berlin. 300 delegates from 35 countries participated in this annual event. You can find some delegates’ quotes as well as some of their impressions of the Summit by going to www.expp-summit.com/review.htm.
2. UN/CEFACT Cross Industry Invoice & the new PDF/A-3 ISO standard for Germany and others?
Around 100 people participated in a public event staged jointly by Speyer University, the German Ministry of the Interior and the German Multistakeholder Forum. Their E-Invoicing initiative sees already broad support in the country and key stakeholders tend to support the recommendations contributed by the forum.
One of the most remarkable suggestions made to stakeholders and the market involves embedding structured invoice data (UN/CEFACT CII) into a PDF envelope. The base for this is to be the brand new international ISO standard 19005-3:2012 (also announced on October 17th as PDF/A-3). A major characteristic of this standard is that users can automatically embed the source documents (e.g. structured E-Invoice data) into the generated PDF/A-3 file. The promoters see it as the best of all worlds, since it takes account of the requirements of most market segments. It is appropriate for users preferring structured invoice data as well as those using just the image part. Several free tools supporting this standard are already available in the marketplace. Will other countries follow the idea of the largest European country?
3. EXPP Summit 2013 in Warsaw
The 9th EXPP Summit will take place on September 23/24th 2013 in Warsaw, Poland. Parties interested in sponsoring this event can find more information about the offered packages and prices on website www.expp-summit.com/sponsoring.htm.

Bruno Koch
Unterer Rebweg 23
9500 Wil


IDC's 4 Pillars

As Big Data/Analytics, Cloud, Mobility and Social come together in an unprecedented way to create entirely new business value solutions and change the ICT playing field, they are enabling intelligent industries and solutions, and most of all - innovation. While productivity issues remain important, there is a noticeable shift across all industries in the decision making and purchasing when it comes to these new technologies. Unlike traditional IT decisions, the keys users of the technology are playing a more significant role than the technical group within the organization. As the 3rd Platform continues to evolve, and the intersection of these trends increases, so will the impact on buyers and their buying behavior.

Big Data
IDC forecasts the business analytics technology & services market will reach $100B in 2012 and that venture capital invested in a new generation of Big Data vendors reached $500M in mid-2012. While this will spur M&A activity, IDC believes that a shortage of analytics and Big Data technology skills will drive buyers towards cloud solutions and appliances.

IDC research shows worldwide spending on public IT cloud services will be more than $40B in 2012 and will approach $100B in 2016. Over the 2012–2016 forecast period, public IT cloud services will enjoy a CAGR of 26.4%, five times that of the IT industry overall, as companies build out the infrastructure needed to deliver public cloud services.

Recent research from IDC says the mobile Internet will be larger than the wired Internet by 2016, and will drive cloud-based business and revenue opportunities given the proliferation of mobile devices and applications. But, with this growing trend toward mobility comes a host of potential security and privacy concerns, especially within the enterprise.

Social Business:
IDC's 2012 Social Business Survey showed an overwhelming acceleration in the number of companies that have deployed enterprise social software, as well as the maturity of use cases. As adoption of enterprise social solutions increases, barriers have decreased, and the concession is that more than one solution may be required to support a company's needs.

For detailed and info and reports on 4 pillars see:


Boğaz'da görsel şölen

Yesterday Turkish Republic celebrated its 89th years. Visual shows at the Bosphorus was splendid.          For pictures:  http://aktuel.mynet.com/galeri/haber/bogazda-gorsel-solen-bogazda-gorsel-solen/10887/949999/  For video:  http://video.ntvmsnbc.com/bogazda-gorsel-solen.html

For a few songs, which I listened during that show:

"Ey Özgürlük"
Poem: Paul Eluard
Composed by: Zülfü Livaneli

"Gün Olur"
Poem: Orhan Veli
Composed by: Zülfü Livaneli

Composed by: Melih Kibar

"Rumeli Hisarının Yapılışı"
Composed by: Can Atilla

 Boğaz'da görsel şölen

Boğaz'da görsel şölen

All Three Branches Agree: Big Brother Is the New Normal

Despite Hurricane Sandy, the Supreme Court on Monday entertained oral arguments on whether it should halt a legal challenge to a once-secret warrantless surveillance program targeting Americans’ communications, a program that Congress eventually legalized in 2008.

The hearing marked the first time the Supreme Court has reviewed any case touching on the eavesdropping program that was secretly employed by the President George W. Bush administration in the wake of the Sept. 11, 2001 terror attacks, and largely codified into law years later.

Just three weeks ago that the Supreme Court closed a six-year-old chapter in the Electronic Frontier Foundation’s bid to hold the nation’s telecoms liable for allegedly providing the National Security Agency with backdoors to eavesdrop, without warrants, on Americans’ electronic communications in violation of federal law. The justices, without comment, declined to review a lower court’s December decision dismissing the EFF’s lawsuit. At the center of the dispute was legislation retroactively immunizing the telcos from being sued for cooperating with the government in Bush’s warrantless spy program.

Fast forward to Monday, and the court took the historic step of hearing a post-September 11 spying case. Judging by the high court’s deference to Congress in general and how it killed the EFF spy case weeks ago, we likely already know the outcome of this highly complex issue now before the justices: Warrantless spying is expected to continue unabated for years, and possibly forever.

University of Baltimore legal scholar Garrett Epps in a Sunday blog post in the Atlantic asked in a headline whether “Big Brother is the New Normal?” His own affirmative answer is spot-on:

“Whatever the court decides, Big Brother will still be watching. Big Brother may be watching you right now, and you may never know,” he said. “Since 9/11, our national life has changed forever. Surveillance is the new normal.”

Let’s start with summarizing the legal issue before that Supreme Court.

The same law that immunized the telcos is before the justices. This time, however, another section of the FISA Amendments Act (.pdf) is at issue. The act, subject to a challenge by the American Civil Liberties Union and others, authorizes the government to electronically eavesdrop on Americans’ phone calls and e-mails without a probable-cause warrant so long as one of the parties to the communication is believed to be outside the United States. Communications may be intercepted “to acquire foreign intelligence information.”

There’s more.

The FISA Amendments Act generally requires the Foreign Intelligence Surveillance Act Court, a secret tribunal set up in the wake of President Richard M. Nixon-era eavesdropping, to rubber-stamp terror-related electronic surveillance requests. The government does not have to identify the target or facility to be monitored. It can begin surveillance a week before making the request, and the surveillance can continue during the appeals process if, in a rare case, the secret FISA court rejects the surveillance application.

Yet none of these details are even before the Supreme Court.

Instead, the fight is about something much simpler.

The Obama administration argues that the ACLU and a host of other groups don’t have the legal standing to even bring a challenge.

A lower court agreed, ruling the ACLU, Amnesty International, Global Fund for Women, Global Rights, Human Rights Watch, International Criminal Defence Attorneys Association, The Nation magazine, PEN American Center, Service Employees International Union and other plaintiffs did not have standing to bring the case because they could not demonstrate that they were subject to the eavesdropping.

The groups appealed to the 2nd U.S. Circuit Court of Appeals, arguing that they often work with overseas dissidents who might be targets of the National Security Agency program. Instead of speaking with those people on the phone or through e-mails, the groups asserted that they have had to make expensive overseas trips in a bid to maintain attorney-client confidentiality. The plaintiffs, some of them journalists, also claim the 2008 legislation chills their speech, and violates their Fourth Amendment privacy rights.

Without ruling on the merits of the case, the appeals court agreed with the plaintiffs last year that they have ample reason to fear the surveillance program, and thus have legal standing to pursue their claim.

That’s it.

That’s what this case before the justices is all about, whether a lawsuit can be brought at all. The courts are years away, if ever, of entertaining the constitutional merits of the law in question. So the spying will continue unabated no matter how the Supreme Court decides Monday’s arguments.

The government’s argument can be reduced to this scary proposition: You can’t sue us for secretly spying on you because there’s no way for you to prove it. Case closed.

Now the thing is, the spying law expires at the end of the year, if Congress fails to re-authorize it.

But that’s not going to happen.
It’s conventional wisdom that they are going to re-authorize,” Alex Abdo, an ACLU attorney who was before the justices Monday, said in a telephone interview.
Sure, Obama promised in 2008 to add oversight and privacy protections when he ostensibly held his nose and voted for telecom immunity as an Illinois senator.
But now re-authorization, without any call for amendment, is the Obama administration’s “top priority.” The House and a Senate committee (.pdf) have approved competing bills that renew the spy powers for between 3 and 5 years.
But on the Senate side, Sen. Ron Wyden (D-Oregon) has stepped in to stop the bill because the government refuses to say how often the spy powers are being used to spy on Americans. Wyden asked the Obama administration a year ago for that information.
The administration replied that it was “not reasonably possible to identify the number of people located in the United States whose communications may have been reviewed under the authority of the FAA.”
Wyden has barred the Senate from a routine vote using a little-used legislative power — called a hold — to block lawmakers from taking a procedural consent vote. Instead, he demands a floor debate that can draw out the approval process indefinitely via the filibuster.
But not even Wyden’s opposition will prevent renewal of the legislation.
A Wyden spokeswoman has said the senator would be willing to agree to a “short term” extension of the measure, instead of seeing the spy powers lapse, in a bid to give lawmakers more time to reach a deal.
So there you have it, the biggest opponent of the law is willing to reauthorize it rather than see it sunset.
Now, back to Monday’s case before the Supreme Court.
Even if the justices side with the ACLU, that does not necessarily mean the constitutionality of the FISA Amendments Act would be litigated — ever.
The lawsuit would return to New York federal court, where the Obama administration likely would play its trump card: an assertion of the powerful state secrets privilege that lets the executive branch effectively kill lawsuits by claiming they threaten to expose national security secrets.
The courts tend to defer to such claims. But in a rare exception in 2008, a San Francisco federal judge refused to throw out a wiretapping lawsuit against AT&T under the state secrets privilege. The AT&T lawsuit was later killed anyway. As I mentioned earlier, the FISA Amendments Act also granted the phone companies retroactive legal immunity for their alleged participation in the NSA spying program.
Indeed. Big Brother is the new normal. The government got caught secretly and illegally turning its powerful spy agency on its own citizens — and we let them then enshrine it into a law that can’t be challenged in court.
Don’t take my word, just ask two American attorneys for an Islamic group called Al-Haramain. The government accidentally sent them proof they’d been spied on — it was ruled inadmissible. They then proved using open source info that the government spied on them without warrants, and won a small amount of money and lawyers fees. An appeals court then tossed that verdict, saying that the wiretapping law as designed by Congress doesn’t actually let citizens sue the government for damages for violating the law.
The game is rigged, the network is bugged, the government talks double-speak, the courts are complicit and there’s nothing you can do about it.



World IT Lawyers is an established global alliance of member firms that share a common aspiration to provide the best service to clients throughout the world, in the full spectrum of IT law. Through recommending expert lawyers with strong international connections we are able to provide an array of services that one firm alone may not have the capacity to do.
World IT Lawyers offers you outstanding service through:
  • Integration
    World IT Lawyers is more than a directory of law firms or contributors to a newsletter. Our network of 13 law firms from around the world came into existence in 2001. We communicate with each other on a regular basis, conduct research projects on current developments in IP law and share each other’s know-how and expertise. World IT Lawyers also holds an annual conference for these purposes. This collaboration allows us to deliver more efficient and effective legal services to our clients.
  • Quality & Focus
    While World IT Lawyers individual member firms practice law in many different areas, the network focuses specifically on IP and IT law. We offer professional competence and in-depth knowledge concerning intellectual property, data protection, telecommunications and other laws affecting the IT industry. This focus, along with the close cooperation between the member firms, yields top quality work for our clients.
  • Value
    World IT Lawyers understand technology-driven companies and appreciate their needs. Network members provide prompt and practical legal solutions, at prices commensurate with the value received by the client.

Speeder Than Broadband: Turkish Airlines Flight Academy

Turkish Flight Academy

Pilotluk Kariyeri

THY Uçuş Eğitim Akademisi her müşteri ve her öğrencisine en yüksek seviyede hizmet sunar. Verilen eğitim, JAR ve ICAO standartları çerçevesinde belirlenmiş ve gerek eğitim kalitesi gerekse güvenilirliği eğitimin her safhasına nüfuz etmiştir. THY Uçuş Eğitim Akademisi’ nin tercih edilme nedenleri;

1) Tecrübeli ve Aktif Pilotlar: Eğitmenlerimiz aktif pilotlardan veya öğretmen pilotlardan sahip oldukları yoğun tecrübe ve üstün eğitmenlik vasıfları nedeniyle özel olarak seçilmiştir. Eğitmenlerimiz kendilerini uçuş eğitimine adamışlardır. Öğrenciler ve onların ihtiyaçları her zaman önce gelir.
Why tarining here?

2)Son teknoloji ürünü GARMIN 1000 donanımlı eğitim uçağı Cessna Skyhawk; Cessna Skyhawk uçuş eğitimini mükemmel şekilde karşılayan bir yapıya sahiptir. Uçağa dışarıdan bakıldığında, uçulması kolay, zevkli bir uçuş sunan sportif ve kararlı bir yapıya sahiptir. Uçağın içini ele aldığımızda geniş bir görüş, konforlu bir iç donanım, düzenli bir avionik tasarım ve mükemmel bir kabin içi iletişim sağlayan bir yapıya sahiptir. G1000 donanımının pilota sağladıkları; Glass kokpit göstergeler, çift Nav / çift Comm / çift GPS kullanımı, trafik bilgisi, mania bilgisi, hava raporu, digital ses paneli, AHRS, 3 eksenli Magnetometre, gelişmiş güvenlik özellikleri, EICAS, ADC ve daha farklı sistemler olarak kısaca özetlenebilir.
Why Training Here?

3) Güncel eğitim dökümanları: THY Uçuş Eğitim Akademisi sağladığı teorik eğitimde yayınlanmış en yeni eğitim dökümanlarını kullanmaktadır. Eğitim alan öğrencilere güncel Oxford Aviation Training Materials seti tedarik edilmiştir.

4) Hedefe odaklı çalışma ortamı: Öğrencilerin daha verimli çalışmalarına olanak sağlamak üzere CBT ( Bilgisayar tabanlı eğitim ) sınıfları tahsis edilmiştir . CBT’ ler Flight Training Software, Jeppesen Training Materials, GARMIN 1000 Simulator gibi birbiriyle etkileşimde olan bilgisayar tabanlı eğitim programlarını içermektedir.


For more info and source:

2013 BMW Motorcycle Model Lineup

2013 BMW K1600GTL Dark Graphite Metallic.jpg
2013 BMW Motorcycle Model Lineup and My Favourite
"K 1600 GTL"

BMW Motorrad has now announced their full 2013 model year lineup and supplied detailed pricing information as well. With scooters, dual sports, standards, tourers and the best sportbikes in the world, BMW Motorrad has a huge product offering to meet the needs of almost any two-wheeled enthusiast. If you are interested in a new BMW motorcycle, contact our sales department via e-mail or give us a call at 415-503-9954 so we can help explain current availability and help you get on the bike of your dreams as soon as possible.
2013 is going to be a HUGE year for the BMW 'GS' family many significant upgrades and changes coming down the pipe. Lots of information has recently been released by BMW about the new water-cooled R 1200 GS in the spring of 2013, probably as a 2014 model year. To keep you up to speed we've already created an information page for the water-cooled R 1200 GS which you can view by clicking here. In addition to the all new R 1200 GS, a number of BMW's are getting significant upgrades. Of particular interest are the updates to the extremely popular F-series GS's.
For model year 2013, the F 650 GS will be replaced by the F 700 GS, while the F 800 GS gets a cosmentic update and benefits from the availability of some technical options that no other middleweight enduro can even come close to.
BMW has now confirmed that a limited-edition HP4 model will be built based off of the extremely popular BMW S 1000 RR. Available in standard trim or equipped with the top of the line 'Competition Package', the HP4 is going to sell extremely fast so make sure to contact us soon if you are interested in securing one of these landmark motorcycles.



At the heart of the Joint Program's work lies the MIT Integrated Global System Modeling framework (IGSM). This comprehensive tool analyzes interactions among humans and the climate system. It is used to study causes of global climate change and potential social and environmental consequences.
Our central research efforts are organized around the IGSM and strive to improve the integratation of climate science, technological change, economics, and social policy analysis into forecasts of the pressing issues in global change science and climate policy.
The MIT IGSM seeks to answer such questions as:
  • How effective and costly would specific policy measures be in alleviating climate change?
  • What are the advantages and risks of waiting for better scientific understanding of such change?
  • How will the oceanic and terrestrial uptake of carbon dioxide and other greenhouse gases be affected by changing climate?
  • What nations, regions, and economic sectors are most likely to be affected?

The IGSM consists of three primary components:
  1. Economics, emissions, and policy cost model for analysis of human activity as it interacts with climate processes, and to assess proposed policy measures;
  2. Climate and Earth system component: coupled dynamic and chemical atmosphere, ocean, land, and natural ecosystem interactions and feedbacks; and
  3. Land ecosystems and biogeochemical exchanges models, within a Global Land System framework, for analysis of the terrestrial biosphere.
These components then inform a component that analyzes the feedbacks and impacts of climate change. Within the current formulation of the IGSM the consideration of climate change impacts emphasizes terrestrial ecosystems and sea levels, feedbacks of changed climate onto the carbon cycle and natural emissions of CH4 and N2O, effects of climate change and ozone pollution on agriculture, and the interaction of climate chemistry with its counterparts in urban air pollution.
The configuration and capabilities of the IGSM are described in Sokolov et al., 2005 (Report 124). An earlier version is documented in Prinn et al. (1999).
An IGSM run data portal is available for public download for research purposes only. There is no user support. Click here to access it.


In Web Search, Be Efficient in the Terms You Use

By this point in the Internet era, everyone should know how to find information on the Web with a search engine like Google or Bing.
Easy, right? Just type what you are looking for in the little box.
There are even easier ways. Google and Bing have built right into their search boxes tools like calculators, currency converters and dictionaries. They developed a host of tricks you can use to slice through clutter to reach the information you need. In some cases the results appear right away; you don’t need to touch the enter key. Many of the shortcuts work with the Web browsers on smartphones and tablets.
“We really try to make Bing a place where you can go to get stuff done in the real world,” said Stefan Weitz, senior director of Bing, Microsoft’s search engine and chief rival to Google. “People expect search now to actually do a better job connecting them to the ultimate destination.” If you need any additional help, Google also offers online tutorials.
TRAVEL TOOLS A fast way to find driving directions with Google is to type your query directly in the search box, using the following format: from 1380 Mass Ave, Cambridge, MA to 815 Boylston Street, Boston. The result is a map along with driving distance, trip time and a link to directions.
If you are planning air travel, you can track fares and be directed to sites for ticket purchases. In the Google search box, type airport codes in the following way: BOS to ABQ. An initial listing of flights appears, along with drop-down calendars to select departure and return dates.
If you click on the “Flights from Boston to Albuquerque” link, you arrive at a more extensive tool for finding flight information, including a lowest fares calculator, available by clicking the small graph-shaped button, or an interactive map, by clicking the balloon button, where you can choose among different departure or destination cities.
Bing’s tool for air travel can be found using the same format of entering airport codes in the search box, and when you drill down further you have choices of buying tickets through sources like Travelocity, Priceline and Expedia.
With either Bing or Google, you can quickly check flight status using the following format: Delta flight status 1512.
Also useful for travelers are language translation tools. In either Bing or Google, use the following format: translate coffee to Turkish. The result, kahve, appears, and if you click the first link you can find tools for translating words into dozens of languages.
Converting currencies is also available by using the following format in either search engine: 100 U.S. dollars in Indian rupees.
In both search engines, to book reservations at restaurants, the search results for a restaurant in a major city will often include a link to OpenTable, a provider of restaurant reservations. (You may need to add a ZIP code or a city name for common names.) The right-hand column might also have other information like reviews and maps.
SOCIAL NETWORKS Both Google and Microsoft have been trying to figure out how best to interact with the trove of information locked away in social networking sites like Facebook, LinkedIn and Twitter.
Microsoft has entered into partnerships with Facebook and others allowing Bing users to connect with people who may know something about their search query. You can log into a Facebook account from the Bing home page, and while you search in Bing, a sidebar appears along the right side of the results page that may display Facebook friends who have some relationship to your search.
If your query is “Mexican restaurants in San Antonio,” and you hover over the image of a friend, you may see a Facebook comment or photo of their favorite place for good mole.
Google has its own social networking service, Google Plus, which enables users to share their favorite search results with friends also on the service.
SPECIALIZED SEARCHES Much has changed since the early days of search engines, and given the vastness of data now available online, knowing a few simple yet powerful shortcuts can pinpoint information more relevant to your search.
You can dig through the Web for specific kinds of files, for example PowerPoint files related to the Affordable Care Act. In Google use the format filetype:ppt the affordable care act. (The ppt part of the query is the extension for PowerPoint files.) Other popular extensions are docx, xlsx and pdf, for Word, Excel and PDF files. Bing flips the search format — type the affordable care act filetype:ppt.
Another very useful way to dig for information is to use the prefix site: to search within a site. For example, type site:washingtonpost.com Mitt Romney to get links to articles, blog posts and other references to Mitt Romney that appeared in The Washington Post. Bing reverses the format — type Mitt Romney site:washingtonpost.com.
To save time, in some instances you can preview information in search results. To preview videos without having to click on them, in the results page of Bing hover over the image of a video and in many cases it will play. And in Google you can see previews of Web pages by moving the cursor to the right of a search result and hovering over a small image of double arrows.
FINDING FACTS If you need a calculator, both Google and Bing can calculate some pretty fancy math queries by entering them in the search box, but Google goes further. Type 4 * 24 in Google and the answer appears as you finish typing, and below that emerges an in-browser calculator with scientific functions. You can also turn Google’s search box into a trigonometric graphing calculator; type, for example, cos(x) + cos(y) and a rotating three-dimensional graph is displayed. From there you can size the graph or grab it to view it from different angles.
Converting measurements is easy using the following format in either search engine: pints in a gallon; centimeters in a foot.
Stock prices are available in either Google or Bing by entering a stock symbol — followed by “stock” if there is any ambiguity. For example aapl stock or sbux stock, pulls up prices of Apple or Starbucks. In Google, using a company name works: Whole Foods stock.
Dictionaries are available as well by using the following format: define perspicacity.
Weather forecasts are quickly at hand by entering a ZIP code or city name, in either Google or Bing, as in weather Denver.
Likewise, to find movies playing in your area, all you need is your ZIP code: movies 10018. (Type in an actor or director followed by the word movies to see what else he or she did.)
But, if you are looking for someone to take out to a movie and impress with all your newfound knowledge, there is no search algorithm just yet. For that, you are still on your own.


Conducting Security-Related Risk Assessments: Updated Guidelines for Comprehensive Risk Management Programs


This bulletin summarizes the information presented in NIST Special Publication (SP) 800-30 Rev.1, Guide to Conducting Risk Assessments. This publication was developed by the Joint Task Force Transformation Initiative, a joint partnership among the Department of Defense, the Intelligence Community, NIST, and the Committee on National Security Systems. SP 800-30 Rev.1 discusses the risk management process and how risk assessments are an integral part of that process. The publication provides guidance for Federal agencies in conducting risk assessments of organizations and their information systems for each step in the risk assessment process. The bulletin covers the overall risk management approach, and how risk assessments fit into a comprehensive risk management process. References are provided to additional sources of information on risk assessment and management.

Author: Shirley M. Radack
Publication Date: October 25, 2012
Pdf. version:


Random Bit Generation Workshop 2012

Cryptography and security applications make extensive use of random numbers and random bits, particularly for the generation of cryptographic keying material. A key to initiate a cryptographic algorithm needs to be unpredictable and statistically unique,that is, to have at most a negligible chance of repeating the value of a previously selected key. Selecting a key at random ensures that there is no known structure to the key selection process that an adversary might be able to use to determine the key, other than by an exhaustive search.
NIST is in the process of completing the development of approved methods for random bit generation. SP 800-90A specifies approved Deterministic Random Bit Generator (DRBG) mechanisms (i.e., algorithms) for generating random bits, given sufficient entropy in their seeding process. Two additional publications have recently been provided for public comment: SP 800-90B and SP 800-90C. SP 800-90B addresses the entropy sources needed to seed the DRBG mechanisms and includes both health tests and validation tests; SP 800-90C specifies constructions for creating random bit generators from entropy sources and DRBG mechanisms. The public comment period for these documents ends on December 3, 2012.
This workshop will discuss these documents and their validation by NIST's validation programs. It is expected that the primary focus of the workshop will be on the entropy sources discussed in SP 800-90B.

Start Date: Wednesday, December 5, 2012
End Date: Thursday, December 6, 2012
Location: Administration Bldg. / Lecture Room B
Audience: Industry, Government
Format: Workshop

US government agency launches Titan supercomputer with thousands of GPUs

The US Department of Energy has launched a new supercomputer that is alleged to be among the fastest in the world for open science research. The machine, dubbed Titan or the Cray XK7 supercomputer, will work in conjunction with the department’s nationwide network of research labs and is operated in Tennessee by the Oak Ridge National Laboratory.
Titan, an upgrade to the Jaguar computer, uses a combination of discrete graphic chips and traditional microprocessors to boost the amount of tasks the computer can complete while reducing the amount of power it needs. Accordingly, it’s estimated to be 10 times more powerful and five times more energy-efficient than its Jaguar predecessor.
It is powered by nearly 300,000 AMD Opteron microprocessors, almost 19,000 Nvidia Tesla K20 ‘Kepler’ GPUs, and some 710TB of memory, allowing it to run at speeds of up to 20 petaflops. Combined, it has the computing power of 500,000 laptops.
“Basing Titan on Tesla GPUs allows Oak Ridge to run phenomenally complex applications at scale, and validates the use of accelerated computing to address our most pressing scientific problems,” said Steve Scott, chief technology officer of the GPU Accelerated Computing business at Nvidia. “You simply can’t get these levels of performance, power- and cost-efficiency with conventional CPU-based architectures. Accelerated computing is the best and most realistic approach to enable exascale performance levels within the next decade.”
Titan will be used by different groups interested in high-level research, including government agencies, academics, and global industry, to work on such complex, computing-intensive subjects as biofuels, climate change, and nuclear energy.
"Why care about these big computers? It's really because society's got big problems," Scott said in a recent interview. "There are healthcare issues, lots of diseases across the board, an aging population. Energy is a huge problem facing the world and our country. ... Increasingly computers are used to solve these problems."
But as powerful as Titan is, the work doesn’t stop here. Researchers at the Oak Ridge lab are hoping to keep improving on the system, with plans for an exascale computer that will reach a performance of 1,000 petaflops by 2020.

Source and Read more:

Guerrilla Marketing for the Home-Based Business

American business is in the midst of cataclysmic change. Reengineering themselves to compete in the new global marketplace, corporations lay off millions of employees and then outsource the services they performed -- often to the former employees themselves. Disillusioned employees are voluntarily leaving the corporate nest in record numbers to set up small businesses of their own. Technological advances make these tiny operations not only competitive but often the optimal provider of services for the next century. These forces have led to an exponential growth of home-based businesses. Generally, these new entrepreneurs already possess the skills necessary to bring their products and services to life. What most lack is practical knowledge of how to position and market themselves. Understandably, most do not want to be marketers; many have a downright aversion to this crucial activity. And many will fail -- not because of their product but because of ineffective promotion. This book can help change that. It will reveal the secrets of the most successful home-based entrepreneurs -- whose proven techniques can unlock the potential of small businesses -- and show you how to quit wasting time and money on strategies that will not and cannot work.

Authors: Seth Godin and Jay Conrad Levinson
Publication Date: October 20, 2012

Why Chris Anderson is One of My Hero?


In 2010 Chris Anderson and Michael Wolff wrote together an article for Wired Magazine. "The Web is Dead. Long Live the Internet". They pointed out us a radical changing with that article. As chairman of the subcomission of new Turkish Commericial Code responsible for all secondary legislation on Digital Company, me personally benefited from Chris and Michael's presumptions, when I wrote that secondary legislation. It's really not just an article, if you think different. If you want to understand the difference between the Web and the Internet, you should have to read this article. Chris came to İstanbul for New Media Order Conference in 2010 (http://konferans.yenimedyaduzeni.com/).

"You wake up and check your email on your bedside iPad — that’s one app. During breakfast you browse Facebook, Twitter, and The New York Times — three more apps. On the way to the office, you listen to a podcast on your smartphone. Another app. At work, you scroll through RSS feeds in a reader and have Skype and IM conversations. More apps. At the end of the day, you come home, make dinner while listening to Pandora, play some games on Xbox Live, and watch a movie on Netflix’s streaming service.

You’ve spent the day on the Internet — but not on the Web. And you are not alone.

This is not a trivial distinction. Over the past few years, one of the most important shifts in the digital world has been the move from the wide-open Web to semiclosed platforms that use the Internet for transport but not the browser for display. It’s driven primarily by the rise of the iPhone model of mobile computing, and it’s a world Google can’t crawl, one where HTML doesn’t rule. And it’s the world that consumers are increasingly choosing, not because they’re rejecting the idea of the Web but because these dedicated platforms often just work better or fit better into their lives (the screen comes to them, they don’t have to go to the screen). The fact that it’s easier for companies to make money on these platforms only cements the trend. Producers and consumers agree: The Web is not the culmination of the digital revolution.

A decade ago, the ascent of the Web browser as the center of the computing world appeared inevitable. It seemed just a matter of time before the Web replaced PC application software and reduced operating systems to a “poorly debugged set of device drivers,” as Netscape cofounder Marc Andreessen famously said. First Java, then Flash, then Ajax, then HTML5 — increasingly interactive online code — promised to put all apps in the cloud and replace the desktop with the webtop. Open, free, and out of control.

But there has always been an alternative path, one that saw the Web as a worthy tool but not the whole toolkit. In 1997, Wired published a now-infamous “Push!” cover story, which suggested that it was time to “kiss your browser goodbye.” The argument then was that “push” technologies such as PointCast and Microsoft’s Active Desktop would create a “radical future of media beyond the Web.”

“Sure, we’ll always have Web pages. We still have postcards and telegrams, don’t we? But the center of interactive media — increasingly, the center of gravity of all media — is moving to a post-HTML environment,” we promised nearly a decade and half ago. The examples of the time were a bit silly — a “3-D furry-muckers VR space” and “headlines sent to a pager” — but the point was altogether prescient: a glimpse of the machine-to-machine future that would be less about browsing and more about getting..."

Full Text and Source:

Makers: The New Industrial Revolution

Wired magazine editor and bestselling author Chris Anderson takes you to the front lines of a new industrial revolution as today’s entrepreneurs, using open source design and 3-D printing, bring manufacturing to the desktop. In an age of custom-fabricated, do-it-yourself product design and creation, the collective potential of a million garage tinkerers and enthusiasts is about to be unleashed, driving a resurgence of American manufacturing. A generation of “Makers” using the Web’s innovation model will help drive the next big wave in the global economy, as the new technologies of digital design and rapid prototyping gives everyone the power to invent -- creating “the long tail of things”.

Publication Date: October 2, 2012

29 Ekim Cumhuriyet Bayramımız Kutlu Olsun

Türkiye Cumhuriyeti bugün 89. yaşında. 29 Ekim Cumhuriyet Bayramımız kutlu olsun. Cumhuriyetin yeni yaşının Ülkemize barış, başarı ve mutluluk getirmesini diliyorum.

A Ravenous Ability to Collect Personal Data

Angry Birds, the top-selling paid mobile app for the iPhone in the United States and Europe, has been downloaded more than a billion times by devoted game players around the world, who often spend hours slinging squawking fowl at groups of egg-stealing pigs.
While regular players are familiar with the particular destructive qualities of certain of these birds, many are unaware of one facet: The game possesses a ravenous ability to collect personal information on its users.
When Jason Hong, an associate professor at the Human Computer Interaction Institute at Carnegie Mellon University, surveyed 40 users, all but two were unaware that the game was noting and storing their locations so that they could later be the targets of advertising.
“When I am giving a talk about this, some people will pull out their smartphones while I am still speaking and erase the game,” Mr. Hong, an expert in mobile application privacy, said during an interview. “Generally, most people are simply unaware of what is going on.”
What is going on, according to experts like Mr. Hong, is that applications like Angry Birds and even more innocuous-seeming software, like that which turns your phone into a flashlight, defines words or delivers Bible quotes, are also collecting personal information, usually the user’s location and gender and the unique identification numbers of smartphones. But in some cases, they cull information from contact lists and pictures from photo libraries.
As the Internet goes mobile, privacy issues surrounding phone applications have moved to the front lines of the debate over what information can be collected digitally, when and by whom. Next year, more people around the world will gain access to the Internet through their mobile phones or tablet computers than from traditional desktop personal computers, according to Gartner, the research group.
The shift has brought consumers in the United States, Europe and other parts of the world into a new gray legal area, where existing privacy protections have failed to keep up with the technology. The move to mobile has set off a debate between privacy advocates and online businesses, who consider the accumulation of personal information the backbone of an ad-driven Internet.
In the United States, the data collection practices of application makers are loosely regulated, if at all; some do not even disclose what kind of data they are collecting and why. Last February, the California attorney general, Kamala D. Harris, reached an agreement with six leading operators of mobile application platforms that they would sell or distribute only mobile apps with privacy policies that consumers could review before downloading.
In announcing the voluntary pact with Amazon, Apple, Google, Hewlett-Packard, Microsoft and Research In Motion, whose distribution platforms make up the bulk of the U.S. mobile app market, Ms. Harris noted that most mobile apps came without privacy policies.
“Your personal privacy should not be the cost of using mobile apps, but all too often it is,” Ms. Harris said at the time.
But simple disclosure, in itself, is often insufficient.
The makers of Angry Birds, Rovio Entertainment of Finland, discloses its information collection practices in a 3,358-word policy posted on its Web site. But as with most application makers around the world, the terms of Rovio’s warnings are more of a disclaimer than a choice.
The company advises consumers who do not want their data collected and advertisements to be directed at them to visit the Web site of its analytics firm, Flurry, and to list their details on two industry-sponsored Web sites. But Rovio notes that some companies do not honor the voluntary lists, which are run by the ad industry.
As a last resort, Rovio cautions those who want to avoid data collection or behavioral advertising simply to move on: “If you want to be certain that no behaviorally targeted advertisements are not displayed to you, please do not use or access the services,” according to the company’s policy, last updated Oct. 8.
Despite multiple requests by phone and Internet over five days, Rovio did not respond to questions or offer an interview for this story.
Full text and Source:


Are you safe online? New ISO standard for cybersecurity

A new ISO standard will help ensure safety of online transactions and personal information exchanged over the Internet, and protect your computer when browsing any Websites.

As we rely on the Internet for all kinds of activities, from sharing important work files to paying our bills, cybersecurity has become a key concern for all of us. A new ISO standard, ISO/IEC 27032:2012, Information technology – Security techniques – Guidelines for cybersecurity, will make cyberspace safer.

Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and networks. Collaboration is essential to ensure a safe online environment. The new standard addresses security gaps arising from the lack of communication between the different users and providers of cyberspace. It tackles any risks not covered by current Internet, network and information and communication technology security.

Johann Amsenga, Convenor of the working group that developed the standard explains, “Devices and connected networks that support cyberspace have multiple owners – each with their own business, operational and regulatory concerns. Not only do the different users and providers share little or no input, but each has a different focus when dealing with security. Such a fragmented state opens up vulnerabilities in cyberspace. ISO/IEC 27032 will provide an overarching, collaborative, multi-stakeholder solution to reduce these risks.”

ISO/IEC 27032 provides a framework for:

·                                     Information sharing

·                                     Coordination

·                                     Incident handling

The standard facilitates secure and reliable collaboration that protects the privacy of individuals everywhere in the world. In this way, it can help to prepare, detect, monitor, and respond to attacks such as:

·                                     Social engineering attacks

·                                     Hacking

·                                     Malicious software (malware)

·                                     Spyware

·                                     Other unwanted software

ISO/IEC 27032:2012, Information technology – Security techniques – Guidelines for cybersecurity, was developed by joint technical committee ISO/IEC JTC 1, Information technology, subcommittee SC 27, IT security techniques. It costs 154 Swiss francs and is available from ISO national member institutes (see the complete list with contact details) and from ISO Central Secretariat through the ISO Store or by contacting the Marketing, Communication and Information department.



NCSA logo

National Cyber Security Alliance's (NCA) mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals use, the networks they connect to, and our shared digital assets.

In a climate of persistent threats, securing cyber space is a responsibility we all share.
Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society capable of leveraging robust and widely available:
  • content
  • community
  • communication
  • commerce
  • connectivity
NCSA builds strong public/private partnerships to create and implement broad reaching education and awareness efforts to empower users at home, work and school with the information they need to keep themselves, their organizations, their systems, and their sensitive information safe and secure online and encourage a culture of cybersecurity.

For more info and source:

FBI Warns: "Smartphone Users Should Be Aware of Malware"

Smartphone Users Should be Aware of Malware Targeting Mobile Devices and the Safety Measures to Help Avoid Compromise
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.

FinFisher is a spyware capable of taking over the components of a mobile device. When installed, the mobile device can be remotely controlled and monitored no matter where the target is located. FinFisher can be easily transmitted to a smartphone when the user visits a specific weblink or opens a text message masquerading as a system update.

Loozfon and FinFisher are just two examples of malware used by criminals to lure users into compromising their devices.

Safety tips to protect your mobile device:

  • When purchasing a smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.
  • Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user’s personal data in the case of loss or theft.
  • With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.
  • Review and understand the permissions you are giving when you download applications.
  • Passcode-protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.
  • Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
  • Be aware of applications that enable geo-location. The application will track the user’s location anywhere. This application can be used for marketing but can also be used by malicious actors, raising concerns of assisting a possible stalker and/or burglaries.
  • Jailbreak or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime an application or service runs in “unrestricted” or “system” level within an operation system, it allows any compromise to take full control of the device.
  • Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.
  • If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
  • Smartphones require updates to run applications and firmware. If users neglect this, it increases the risk of having their device hacked or compromised.
  • Avoid clicking on or otherwise downloading software or links from unknown sources.
  • Use the same precautions on your mobile phone as you would on your computer when using the Internet.

If you have been a victim of an Internet scam or have received an e-mail that you believe was an attempted scam, please file a complaint at www.ic3.gov.


A Web of Answers and Questions

IT starts with a lowering of our shoulders. You and I have just befriended each other, and now we are well into our first cocktails on our first-ever get-together. We’ve bonded over a mutual appreciation of Roald Dahl, and now you’ve endeared yourself further with your comment that the name Real Simple sounds like a manual for people with learning disabilities.       
When we hit our first lull in the conversation, I try to bridge it by asking you about the two years you lived in Boulder, Colo.
“How did you know I lived in Boulder?” you ask, darty-eyed.
“I Googled you last night. I’m sorry.”
“No, no. I’m, uh?... I’m flattered?”
You are? Which is what I was hoping for? But suddenly the tiniest shred of doubt is implied by all the tonal upticks.
“It’s perfectly natural and almost always appropriate,” said Kate Fox, a social anthropologist, about the practice of Googling social or business contacts before getting together with them.
“Obviously, one is always going to have to be discreet when talking about what you’ve found,” said Ms. Fox, a director of the Social Issues Research Center in Oxford, England. “But our brains haven’t changed since the Stone Age, and humans are designed to live in small groups in which everyone knows one another. Googling is an attempt to recreate a primeval, preindustrial pattern of interaction.”
But by the same token, doesn’t taking this shortcut to a primeval, preindustrial pattern of recognition sometimes rob encounters of their inherent mystery? The song is called “Getting to Know You,” not “I’ve Already Researched You.” Sometimes it’s better not to pore over the dossier handed to us, even if it comes from a natural blonde with the State Department in a sweater set and pearls.
Worse, sometimes our online research lands us in thickets. Tina Jordan, an executive in book publishing who has the same name as a former girlfriend of Hugh Hefner, said, “I typically tell any blind dates before I meet them that they probably shouldn’t Google my name, otherwise they’ll be sorely disappointed when they meet me.”
Masami Takahashi, an associate professor of psychology at Northeastern Illinois University, used to use Japanese characters for his name whenever he delivered papers at academic conferences in Japan, until a colleague who had Googled him pointed out that Mr. Takahashi shared the same name in Japanese as a pornographic-film star. Mr. Takahashi said, “Since then, I use only the English alphabet for my name.”
Job applicants who reveal their ignorance of the doings or leadership of the company they are interviewing with can expect to meet with no enthusiasm. “I always Google my prospective clients,” said Janet Montano, a real estate agent in Tampa, Fla. “The mug shots come right up on the top. ‘Not going to get in my car!’ ”
But Ms. Montano said she would never tell a potential homebuyer that she had Googled him. “It’s not very polite,” she said. “I don’t go there.” In one instance, she said, the search worked in a homebuyer’s favor. “It was someone who I probably wasn’t going to work with,” she said. “But then I checked him out and saw who he was.” When she learned he was a popular radio disc jockey, she realized he was a qualified buyer.
Full text and Source:

Unauthorized Access: The Crisis in Online Privacy and Security

This book provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors explore the concept of informational privacy and suggest rules to limit the distribution of public information from private businesses. They discuss how computers, database technology, and the Internet enable mass surveillance. The text includes a non-technical introduction to the types of malware that are typically used to illegally access information, along with strategies for defending against such attacks. It also presents possible market, legal, and technical solutions to these challenges.

Authors: Sloan, Robert/Warner, Richard
Publication Date: October 15, 2012

ITU-IMPACT's "Cybersecurity Drill"

ITU-IMPACT holds first ever pan-European cross-border cybersecurity drill

19 nations participate in regionwide test of cybersecurity capabilities

ITU and its cybersecurity executing arm, the International Multilateral Partnership Against Cyber Threats (IMPACT), has organized the first UN-backed cross border cyber drill for Europe and CIS countries designed to test national cyber response capabilities and improve readiness and reaction in the event of a theoretical cyber attack.
Over 90 experts from 19 European and CIS countries were involved in the virtually simulated attack coordinated by ITU and IMPACT in collaboration with Bulgaria’s Ministry of Transport, Information Technology and Communication. The simulation, which was sponsored by ABI Research, took place during theITU Regional Forum on Cybersecurity for Europe and CIS from 23-25 October 2012 in Sofia, Bulgaria.
The Applied Learning for Emergency Response Team (ALERT) cyber drill featured a total of eight actively participating countries: Armenia, Bulgaria, Moldova, Montenegro, Romania, the Slovak Republic, Turkey and Ukraine, with 11 other European nations taking part as official observers: Albania, Austria, Azerbaijan, Croatia, Italy, Kyrgyzstan, Luxembourg, Malta, Poland, Portugal and Tajikistan.
A series of scenarios totalling 250 minutes were triggered during the exercise to put participants to the test and observe their responses. These scenarios included phishing, web defacement and wireless security breach.
The event also benefited from the participation of ITU-IMPACT's key industry partners including Codenomicon, Internet Society Bulgaria, Kaspersky Lab, Lirex.com, Microsoft, Symantec and The Cyber Guardian.
It is the third in ITU-IMPACT’s series of ALERT cyber drills, with previous exercises taking place in theSouth East Asia region and theArab region.
“This regional forum and associated cyber drill are concrete examples of the highly effective regional cooperation that is needed to combat the global scourge of cyber criminality,” said ITU Secretary-General Dr Hamadoun I. Touré. “Through our partnership with IMPACT, ITU is putting state-of-the-art cybersecurity tools and expertise within reach of all 193 ITU Member States, and in particular our developing country members who might struggle to establish their own advanced national cybersecurity programme and infrastructure.”
“Because cybersecurity issues can become a national security threat, it is essential that CERTs/CIRTs (community emergency response teams/critical incident response teams) share information and experience on cross-border incident handling and collaborate and coordinate with government and industry players to address and mitigate these challenges and secure critical infrastructure,” said Datuk Mohd Noor Amin, Chairman of IMPACT.
With 144 countries now part of the ITU-IMPACT coalition, IMPACT is entrusted with the task of providing cybersecurity support and services to ITU’s Member States and other organizations within the UN system.
ITU-IMPACT’s global partnership now embraces over 200 industry, academia and international organizations.