Feeds

Safer Internet Day highlights dangers online

Reid: 'Bandwagon ho!'

5 things you didn’t know about cloud backup

The fourth Safer Internet Day, today, will be marked with events worldwide aimed at raising awareness of online child protection issues.

Safer Internet Day, organised by EU online safety initiative Insafe, will include a repeat of 2006's "blogathon", where children in 25 countries will showcase work being done in classrooms to alert them to threats. Sessions this year from Australia to the UK will concentrate on privacy, social networking etiquette, and safely sharing photographs with friends.

It comes the same day as Home Secretary John Reid said he was considering requiring sex offenders to register their email addresses and chat room handles. The announcement also comes in the wake of yesterday's unprecedented conviction of three men who had never met, but via the internet conspired to rape two teenage sisters.

The Home Office said any concrete plan would mean penalties for registered sex offenders who did not keep authorities up to date with their online identity. Presumably, this will be more than enough to stop them opening yet another Hotmail account.®

5 things you didn’t know about cloud backup

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?