Computerworld - The Internet is becoming an increasingly filtered medium. At the same time, organizations depend on absolute transparency when it comes to delivery of information in the form of e-mail, Web pages or from other applications. Given the growing reliance on
the Internet for remote work and the increased need for integration with external partners' networks, the transparent enterprise depends on open networks -- both internally and across the entire Internet.
While we think of the Internet as the ultimate open communications platform, it may not be as open as we think. The twin plagues that sometimes threaten to bring the Internet to its knees -- spam and pornography -- may be undermining this openness.
More than a decade ago, Internet architect and civil libertarian John Gilmore famously declared, "The Net interprets censorship and routes around it." Today's Internet is much different.
In response to the scourge of spam, many filters, some of which are largely invisible to enterprises and end users, stand between e-mail senders and recipients. Filtering techniques range from trapping messages with spoofed domain names to content-based filters that use sophisticated machine-learning techniques to spot potential spam ISPs. Other service providers are filtering literally billions of messages per day and dumping them into the digital void. Sometimes this happens under the control of the enterprise, and sometimes it doesn't. The cumulative effect, however, is very hard to assess or manage.
The latest domain authentication technique, known as Sender ID, is somewhat hung up in the standardization process because of possible patent-licensing problems , but it appears likely that some form of sender authentication will be put into place soon.
Client-side filters operate under user or local enterprise control and offer a considerable range of configuration options. Those who use this sort of spam filter have the satisfaction of seeing far fewer prescription drug offers and financial scams, but it's very hard to know whether overfiltering is weeding out messages that we'd actually like to see. Our only options are to turn down the filtering rate and open our in-boxes to more spam, or to actually wade through all mail tagged as spam and manually check for mistakenly filtered messages. Neither option is particularly appealing, so it seems likely that we'll get used to the idea that we are just going to miss valuable messages. Not exactly the model of transparency.
Web content is also increasingly filtered. Enterprise gateways often block URLs that appear on lists identifying sources of pornographic or offensive material. Other sites are blocked because they are identified as sources of harmful spyware.
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Ten Factors Shaping the Future of Application Delivery Download this research report conducted by Enterprise Management Associates (EMA) to learn how those that are seeking to accelerate application delivery are leveraging...
- HTTP Status Code Cheat Sheet Look at the Graph, Find the Code and Boom - You're Solving Problems. Identifying and understanding common HTTP status codes can go a...
- Architects lead the next generation of data-driven applications Read this whitepaper to find out how application architects can quickly and confidently deliver long-lasting applications that minimize cost, complexity, and risk while...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt. All Desktop Apps White Papers | Webcasts