Welcome!

Intelligent Information Sharing

Ted McLaughlan

Subscribe to Ted McLaughlan: eMailAlertsEmail Alerts
Get Ted McLaughlan via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Ted McLaughlan

With the proliferation of Internet-based tools and forums to share information, deliver announcements or warnings and create collaborative networks, it’s become apparent that “self-policing” strategies for controlling and managing the risks involved in delivering content through the corporate firewall can’t mitigate most risks. Most corporations and government agencies do indeed require, as terms of employment and various legislation, that care be taken and policies or procedures followed when engaging in online public discourse or otherwise moving content from the corporate-controlled environment to the public Internet. Over the past years, many good tools and governance frameworks have been developed as a routine matter of enabling Internet content posting, distribution and syndication – but these have mostly focused on automation, protection and monitoring proced... (more)

Federal Government Social Networking and Enterprise Data

I recently participated in a very interesting discussion about mechanisms and issues for leveraging external (i.e. outside the firewall) social networking tools in the Federal Government; for example, browsing and executing searches in Facebook, using Flickr for socializing and recieving comments on photographs, and participating in "open" blog discussions. While this isn't necessarily a new issue, and many agencies are gradually enabling "Government 2.0" for both their constituents and employees/contractors (more quickly in the Intelligence arena), the rapid growth and pressure ... (more)

Social Media Simulation and Training Environments by an Internet Media Coach

New Media on Ulitzer All well-known systems engineering methodologies and enterprise system development programs leverage testing environments. Testing environments can be built and operated for very different purposes, ranging from prototyping and simulation, to pre-production load testing and usability or “Section 508 Accessibility” checks. Specialized SOA testing frameworks are sometimes required, for difficult infrastructure integration challenges. Most major systems that get deployed to large numbers of users also feature a training environment. This working copy of the “re... (more)

Two-Factor Web Authentication in Healthcare

Here's a very good article concerning the various types of strong identity management, multifactor and two-factor authentication solutions that are necessary for healthcare system and process identity enforcement - recently written by John D. Halamka MD, a self-described Healthcare CIO. Strong Identity Management In this article, Dr. Halamka states that he's had a wide range of experience with many of these token-based and tokenless two-factor authentication methods, including security tokens, smart cards, biometrics, certificates, soft tokens, and cell phone-based approaches. His ... (more)

Ten Tips for Promoting your Employer with Personal Social Media

New Media on Ulitzer I’ve been asked from time to time by businesses about how to educate employees on using Social Media – from two perspectives. One perspective is simply as part of a broader Internet use policy, to help employees stay safe and protect information assets. Another perspective is to encourage employees to support their business in their daily online activities, should they choose to do so. This is essentially giving employees as “social media enthusiasts” the tools and guidance they should get, to help them positively contribute to the overall online marketing e... (more)