4 November 2014
Friday, 20 March 2015
The Government is working to make the UK one of the safest places in the world to do business. As part of this we recognise the importance of obtaining reliable data about information and cyber security breaches and practices. We make this information publicly available so all businesses can benefit from it. I therefore urge you to take the time to complete this survey to enable us all to gain valuable insight to support and guide businesses and Government policy. Thank you very much for your valuable time and input into this survey. Ed Vaizey – Minister of State for Culture and the Digital Economy
There will be a general election in 2015. In preparation many bodies have produced manifestos to try to influence government policy in the IT space. Are they asking for the right things? Brian Runciman MBCS reports on some of the manifestos and highlights some BCS reaction from a recent policy meeting.
The Internet of Things (IoT) - Everyday objects increasingly contain embedded technology (e.g. sensors) to communicate, sense and interact with the environment in which they are placed, with humans, and with remote information systems. As more information is produced these objects will interact between themselves with the aim to improve the quality of human life. An example - Your car detects from a tyre sensor that the tread depth will be illegal in around 200 miles and will need replacing in one week’s time based on your driving habits in the last seven days. The car interacts with a system that you have permitted to interact with it, and automatically books an appointment at the local service centre and orders the exact tyre required from the supplier offering the best price.
Network neutrality has been used to describe a number of contentious issues from a commercial, legal, security and operational viewpoint. Generally speaking, it has been taken to mean that any choice of communications service or information technology component does not reduce other choices available to the user for different services or components, and that each choice is treated neutrally by other elements in the end-to-end service continuum. This includes all devices, services, management tools, content and applications, and the sender or receiver IP address.
Mobile communications involves provision of services using wireless transmission.
Cyber to the Citizen initiative