Computerworld - The Internet is becoming an increasingly filtered medium. At the same time, organizations depend on absolute transparency when it comes to delivery of information in the form of e-mail, Web pages or from other applications. Given the growing reliance on
the Internet for remote work and the increased need for integration with external partners' networks, the transparent enterprise depends on open networks -- both internally and across the entire Internet.
While we think of the Internet as the ultimate open communications platform, it may not be as open as we think. The twin plagues that sometimes threaten to bring the Internet to its knees -- spam and pornography -- may be undermining this openness.
More than a decade ago, Internet architect and civil libertarian John Gilmore famously declared, "The Net interprets censorship and routes around it." Today's Internet is much different.
In response to the scourge of spam, many filters, some of which are largely invisible to enterprises and end users, stand between e-mail senders and recipients. Filtering techniques range from trapping messages with spoofed domain names to content-based filters that use sophisticated machine-learning techniques to spot potential spam ISPs. Other service providers are filtering literally billions of messages per day and dumping them into the digital void. Sometimes this happens under the control of the enterprise, and sometimes it doesn't. The cumulative effect, however, is very hard to assess or manage.
The latest domain authentication technique, known as Sender ID, is somewhat hung up in the standardization process because of possible patent-licensing problems , but it appears likely that some form of sender authentication will be put into place soon.
Client-side filters operate under user or local enterprise control and offer a considerable range of configuration options. Those who use this sort of spam filter have the satisfaction of seeing far fewer prescription drug offers and financial scams, but it's very hard to know whether overfiltering is weeding out messages that we'd actually like to see. Our only options are to turn down the filtering rate and open our in-boxes to more spam, or to actually wade through all mail tagged as spam and manually check for mistakenly filtered messages. Neither option is particularly appealing, so it seems likely that we'll get used to the idea that we are just going to miss valuable messages. Not exactly the model of transparency.
Web content is also increasingly filtered. Enterprise gateways often block URLs that appear on lists identifying sources of pornographic or offensive material. Other sites are blocked because they are identified as sources of harmful spyware.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Desktop Apps White Papers | Webcasts