Elon University

Chapter 14: Where Do We Go From Here?

All of these problems, and more, can also be addressed by a thorough program of internal network security and education. Make no mistake – we do not think such ideas are a substitute for a firewall in a high-threat environment. But they can and will slow down the rate of any penetration attempts, regardless of their origin.

Chapter 14: Where Do We Go From Here?

Firewalls are not the be-all and end-all of security … Much more can and should be done … We recommend very strong authentication by the server (PPPÕs challenge/response mechanism is adequate), coupled with a packet filter to block any routing protocols or any packets with an invalid source address.

Technology: An Electronic Roundtable: Two Dozen Users and Analysts Examine the Potential – and Shortcomings – of Networks

The perfectly friendly interface is too often seen as the Holy Grail of online service designers. It’s the application, stupid! It doesn’t matter how cute the icons are in my spreadsheet software – I’m not going to use it to balance my checkbook … If the online industry is going to attract a lot of new users, we’re going to have to spend less time inventing new features and more time figuring out the answer to the fundamental question of defining something of value that people need and want … Perhaps the thing online services could do today to make the technology more user-friendly is hire a few less programmers and a lot more guides, teachers and facilitators to bridge the gap between the complex resources and people who currently find them arcane.

The College Classroom of the Year 2010

Guaranteeing equal opportunity of access to the technology and software, and equal opportunity to add to and comment on the information in the network, should be items Number One and Two in the Virtual University Bill of Rights, I believe.