123 Main Street, Anytown, USA – now with pictures

http://data.mashedworld.com/dualmaps/map.htm?x=-88.393290&y=44.262464&z=16&gm=0&ve=5&gc=0&bz=1&bd=0&mw=1&sv=1&svb=0&svp=0&svz=0&svm=1&svf=1

AppletonDatamashedWorld

This is the most interesting (to me, that is) free map application I’ve seen.  You’re looking at my neighborhood in Appleton in several ways, simultaneously.

I found it because the city of Appleton links to it from their "My Appleton" site:  http://my.appleton.org/Propdetail.aspx?PropKey=311043500  which is sitting on one of the canonical ESRI GIS systems (which I know only because I saw upgrade costs in the city budget docs.)

 

I’m updating Cygnipede and have been spending time looking at how this sort of data can be used.

Advertisements

[SCADASEC] – encryption requirements vis a vis privacy regulations

SCADASEC is a publicly-accessible (after you sign up) email list devoted exclusively to IT security issues as they pertain to our industry.

Not specific or necessarily immediately relevant to SCADA, but interesting because it points to possible architecture requirements for future systems that move personal or regulatorily-controlled data. –Lynne

 


Subject:
[SCADASEC] Encryption requirements?

Date:
Tue, 06 Oct 2009 12:34:39 -0500

From:
Bob Radvanovsky <rsradvan@unixworks.net>

All —

I came across this from another mailing list that deals with legal issues/aspects of IT systems, and their environments.  Although the spin on the series focuses mostly on credit card and electronic transaction processing, I believe that this raises issues about the use of, and the level of encryption for the SCADA/control systems industry.

To me, the main question is: how much is enough?

Alternatively, another question might be: will encryption help secure my environment(s)?

I don’t an easy answer for either question, but wanted to bring this to everyone’s attention.

The URL links are provided for your reading enjoyment.  There are four (4) parts, and are provided in their parted condition:

Part 1:
http://www.infolawgroup.com/2009/10/articles/encryption/code-or-clear-encryption-requirements-under-information-privacy-and-security-laws-part-1

Part 2:
http://www.infolawgroup.com/2009/10/articles/encryption/code-or-clear-encryption-requirements-part-2

Part 3:
http://www.infolawgroup.com/2009/10/articles/encryption/code-or-clear-encryption-requirements-part-3

Part 4:
http://www.infolawgroup.com/2009/10/articles/encryption/code-or-clear-encryption-requirements-part-4
_______________________________________________
To unsubscribe from this mailing list, please visit:
http://news.infracritical.com/mailman/listinfo/scadasec

To review our usage policy, please visit:
http://www.infracritical.com/usage-scadasec.html