Feeds

New fraud concerns over Dutch ballot computers

Good enough for local elections

Top 10 endpoint backup mistakes

A Dutch plan to use e-voting computers by manufacturer Sdu for the coming provincial elections in March has met with fierce criticism.

In October Dutch intelligence service AIVD tested over 1200 e-voting machine by Sdu and found them unreliable. An investigation by the intelligence service revealed that the radio signals used by the computers to record votes could be intercepted 20 to 30 meters away. Minister for Administrative Reform Atzo Nicolai withdrew the permit for the use of the computers.

However, the Dutch Ministry of the Interior now believes the Sdu computers can be used for the provincial elections, which usually don't draw huge crowds to the polling booth.

Dutch IT experts from anti e-voting group Wij vertrouwen stemcomputers niet (We don't trust voting computers) are against using the Sdu machines.

Last year the group revealed that NEDAP e-voting machines could be made to record inaccurate voting preferences and even be reprogrammed to run a chess program. The Dutch group believe the Sdu machines suffer from a potential weakness: they run under Windows XP using a wireless modem.®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?