Main | November 2007 »

October 28, 2007

Invasive Search

Has search become invasive? Take the matter of

Viral SEO

for example.
Unfortunately, law and legal precedent are not clear cut on all of these matters. The current laws have evolved from older technologies and could hardly be expected to anticipate the realities of future ones. The digital technology of the World Wide Web severely challenges the rules of the game for the simple reason that it has radically altered the playing field. Simply put, the means and opportunity for copyright infringement are abundant in this new medium. Thus, a new method of distribution for intellectual property has upset the established balance between producers and consumers. Whether the remedies are legal, technological or both, these issues will not be resolved until this balance is restored.

Posted by kamokazi at 04:55 PM | Comments (0)

Access To Relevent Info

Authors may limit access to their own pages using various means. Pages may be protected so that only authorized users have access. However, extreme measures like these do not have to be taken. An author can either expressly prohibit links to his or her pages or object to those who have created such links. In these instances, posting external links on your own web pages would probably constitute improper use. For this reason, the safest policy is to notify or seek consent from authors when you create external links to their pages.

Posted by kamokazi at 04:15 PM | Comments (0)

Internet security

How do you secure something that is changing faster than you can fix it? The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, while still growing and evolving at a breakneck pace, is probably impossible. Deep infrastructure changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes.

Posted by kamokazi at 02:57 PM | Comments (0)

First post!

This is the start of a new blog about consultation and how it could benefit many of us. the next post will be about internet security.

Posted by kamokazi at 02:48 PM | Comments (0)