2,153
edits
(Created page with '<div style="float:right">http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/themes/blueprint/images/logo.png</div> At the [http://cyber.law.harvard.edu/ Berkman Center for…') |
No edit summary |
||
Line 19: | Line 19: | ||
One individual adamantly insisted if an organization doesn't have the technical prowess or money to do things properly, they don't deserve to be online. I think he was missing the point. Berkman suggested an insurance like approach, where many organizations pool at $10, $100, $1000 price points, but I can still see many problems for an individual organization that needs individual support or custom services. | One individual adamantly insisted if an organization doesn't have the technical prowess or money to do things properly, they don't deserve to be online. I think he was missing the point. Berkman suggested an insurance like approach, where many organizations pool at $10, $100, $1000 price points, but I can still see many problems for an individual organization that needs individual support or custom services. | ||
I did like their idea of a fallback to a minimized hosted service in the event of attack, but this still calls for technical support that can pay attention to individual needs. And in fact my feeling overall was the idea of content was somewhat outdated, based on blogging and news sites. Today people cutting and pasting | I did like their idea of a fallback to a minimized hosted service in the event of attack, but this still calls for technical support that can pay attention to individual needs. And in fact my feeling overall was the idea of content was somewhat outdated, based on 15 year old blogging and news sites. Today people cutting and pasting stories on Facebook or mailing lists may be as important as a "content distribution network" for the organization's purposes, and comments have turned into conversations. These means need to be promoted as well as protected, since there are many inadvertent security risks to a third party widget services that recognize your login when you visit a commodity site. | ||
{{Blikied|June 11, 2010}} | {{Blikied|June 11, 2010}} |