BizEd

MayJune2004

Issue link: http://www.e-digitaleditions.com/i/61380

Contents of this Issue

Navigation

Page 52 of 67

When you think SUPPLY CHAIN, think ORANGE... SYRACUSE UNIVERSITY'S supply chain management program— established in 1919—is as old as the business school itself. Today the Whitman School of Management is celebrated for its— • comprehensive BS, MBA, and PhD programs in supply chain management • pathbreaking faculty advancing supply chain knowledge and practice • membership in the SAP University Alliance, using commercial ERP solutions to give students a command of integrated supply chain processes • annual Enterprise Symposium, assessing business solutions at the forefront of industry • prestigious Salzberg Medallion, recognizing innovators in logistics and supply chain management since 1949 The nation's first supply chain management program large role in getting the message to students about the growing number of jobs in IT. "It appears that the enrollment trends are driven by pop- ular press reports and not by long- term analysis," Baskerville remarks. "The correction will probably have to wait for the press to discover the building shortage of workforce IT business skills." counseling methods is needed quickly, he emphasizes. "We should be doing better in career counseling for our students," he says. "Students aren't getting the message." In addition, the media may play a New Tech Blocks Cyberattacks There is another line of defense between com- puters and malicious viruses, thanks to Yuliang Zheng, a professor of information technology, and Lawrence Teo, an IT doctoral student, at the Belk College of Busi- whitman.syr.edu/scm Professor Scott Webster, stwebste@syr.edu ness Administration at the Univer- sity of North Carolina at Charlotte. Zheng and Teo have written a computer program, the "Access Enforcer," designed to stop both known and unknown cyberattacks by viruses, worms, and hackers. Zheng is a cybersecurity expert with experience in efficient cryptographic techniques and applications, intru- sion prevention and detection, pri- vacy enhancing technology, message encryption, authentication technol- ogy, and wireless security. The new technology works, Zheng compares it to watch- ing a highway with different vans, cars, and trucks passing by. There's is housed in a small plug-and-play appliance that plugs into an exist- ing computer network through an Ethernet cable. No special down- load or installation is required. To explain how the device like firewalls and intrusion detection systems, the Access Enforcer uses a simple set of rules to apply to the patterns of data traffic it monitors. Those rules might differ from user to user—a Web service company would require different track- ing rules than a bank, for instance. After its program has been exposed to a company's net- work traffic in real time, the device can detect abnormal data and shut it down while allowing D ATA B I T A new study from comScore Networks of Reston, Virginia, notes that the number of Inter- net users is now more than 150 million, seven times the number the company found in its 1996 study. In 2004, the study predicts online spending will surpass $100 billion. BizEd MAY/JUNE 2004 51 no way to distinguish a pattern of behavior by watching just one vehicle. But after watching many vehicles—or, in this case, data—the device learns which don't belong by their appear- ance, behavior, and content. Unlike current security products

Articles in this issue

Archives of this issue

view archives of BizEd - MayJune2004