After 9/11 and after the Enron follies, more security (and, concomitantly, less privacy) became the order of the day. Right now, to the concern of some and the delight of others, formerly niche monitoring and tracking technology applications are being repurposed for more general, widespread use. Here are three you will encounter in 2003.1. Digital rights management (DRM). “This will be huge,” says Chris Hoofnagle, legislative counsel for the Electronic Privacy Information Center (EPIC) in Washington, D.C. Applications in the general area of DRM can turn off copy-and-paste functions, inhibit the forwarding of e-mail and prevent documents from being printed. In addition, these apps usually provide the ability to track who has done what to any document. DRM is not new, but in 2003 it will be applied far more broadly than ever.Corporate scandals have surely driven the proliferation of DRM apps, but the everyday leaking of proprietary data over the Internet is as much to blame. “We’ve talked to human resources departments, and they say they are literally afraid to give data to their employees,” says Jeffrey Melvin, CEO of Rovia in Cambridge, Mass., one of the companies packaging DRM software. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe 2. Defense-grade monitoring for the enterprise. “You’ll see a lot of defense companies turning to the enterprise this year,” says Hoofnagle. Lexington, Mass.-based defense contractor Raytheon, for example, turned a military-grade espionage application, SilentRunner, into a wholly owned spin-off in October 2001, and the new company hit the ground running with a suite of monitoring products with the same name. SilentRunner provides high-end packet sniffing. It’s similar to the FBI’s famous Carnivore program but, many say, even more effective. SilentRunner “n-gram” analysis identifies and tracks similar documents without using keywords. In other words, even if you try to hide the fact that your memo is sensitive by changing all the identifying words or phrases, SilentRunner can still spot it.3. Enhanced passenger profiling. Airlines have used computer profiling for years, but their programs were keyed only to an individual’s history with the airlines. No longer. The Transportation Security Administration is working on an enhanced version of its Computer Assisted Passenger Prescreening System, called CAPPS II. This new version will check everything the old system did?if, say, you bought a one-way ticket at the last minute or if you paid cash?but it will also link to all sorts of databases to pull out and check such information as your mailing address, recent purchases, driving record, criminal history and credit rating. Does all this go too far or is it simply a rational response to the world we now live in? Whatever your position, there’s little doubt that the debate?and the technology?will heat up this year. Related content brandpost Unlocking value: Oracle enterprise license models for optimal ROI Helping you maximize your return on investment of Oracle software program licenses is not as complex as it sounds—learn more today. By Rimini Street Oct 02, 2023 4 mins Managed IT Services IT Management brandpost Lessons from the field: Why you need a platform engineering practice (…and how to build it) Adopting platform engineering will better serve customers and provide invaluable support to their development teams. By VMware Tanzu Vanguards Oct 02, 2023 6 mins Software Deployment Devops feature The dark arts of digital transformation — and how to master them Sometimes IT leaders need a little magic to push digital initiatives forward. Here are five ways to make transformation obstacles disappear. By Dan Tynan Oct 02, 2023 11 mins Business IT Alignment Digital Transformation IT Strategy feature What is a project management office (PMO)? The key to standardizing project success The ever-increasing pace of change has upped the pressure on companies to deliver new products, services, and capabilities. And they’re relying on PMOs to ensure that work gets done consistently, efficiently, and in line with business objective By Mary K. Pratt Oct 02, 2023 8 mins Digital Transformation Project Management Tools IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe