Thursday, September 27, 2007

Town meetings on the tubes

The town is making some progress in exploring the possibility of putting town meetings on the website. (In fact, check out this Sunday's WRA... Jodie Mozdzer should be running a story on the use of internet video for (area) town meetings. Cheshire may get mentioned!)It's interesting to see the point at the bottom of the memo though... the point about the Town Clerk "owning" the minutes to meetings... and with two Council members having told me that there were "legal issues" with putting meeting minutes on the website... I'm still scratching my head. After all, if that's the case, then what is this? And who "owns" it?

Bottom line though on this memo... it is good to see we're making progress on the use of internet video. I'm convinced that over time, people would learn of it, use it and appreciate it.

Tim White
Town Council, 4th District

9 comments:

Anonymous said...

Tim,

I'm surprised you didn't mention an error on the page stating the law firm of John Knott as the named town attorney.

I think the site still has basic problems with out dated general information and poorly designed navigating links. None of this is a big deal to correct if one or two staffers are required to do this on a routine basis.

Anonymous said...

no one cares stop wasting our time tim boy and give us someghing anyghing

Anonymous said...

which tim boy?

Anonymous said...

the tim boy that has been wasting our time with this video crap
the same time boy who has changed his mind now has decided that he might be for the turf
when he was against it before

Anonymous said...

To Saturday, September 29, 2007 10:24:00 PM:

The same "tim boy" who provides this blog.

The same "tim boy" who allows you to post your comments.

And the same "tim boy" who will be re-elected to the town council.

Anonymous said...

"give us someghing anyghing"
"the same time boy"


Get help from your mom if you want to post. You need a lot of help boy.

Get some facts and start using your brain. Remember use it or lose it.

Anonymous said...

the same tim boy who can't make up his mind until he puts his finger in the wind
the same tim boy who can't get along with any one in town hall
the same tim boy who is going down like schrumm and orsini
and carroll

Anonymous said...

Is there an anger management course offered through the Continuing Ed program in town? Anger Management Anonymous -AMA
or is should this angry Anon just get a referral to AA?

Anonymous said...

You “video experts” might want to read this:

Oct 2, 7:46 AM (ET)

By GREG BLUESTEIN
ATLANTA (AP) - Online videos aren't just for bloopers and rants - some might also be conduits for malicious code that can infect your computer.

As anti-spam technology improves, hackers are finding new vehicles to deliver their malicious code. And some could be embedded in online video players, according to a report on Internet threats released Tuesday by the Georgia Tech Information Security Center as it holds its annual summit.

The summit is gathering more than 300 scholars and security experts to discuss emerging threats for 2008 - and their countermeasures.

Among their biggest foes are the ever-changing vehicles that hackers use to deliver "malware," which can silently install viruses, probe for confidential info or even hijack a computer.

"Just as we see an evolution in messaging, we also see an evolution in threats," said Chris Rouland, the chief technology officer for IBM Corp.'s Internet Security Systems unit and a member of the group that helped draft the report. "As companies have gotten better blocking e-mails, we see people move to more creative techniques."

With computer users getting wiser to e-mail scams, malicious hackers are looking for sneakier ways to spread the codes. Over the past few years, hackers have moved from sending their spam in text-based messages to more devious means, embedding them in images or disguised as Portable Document Format, or PDF, files.

"The next logical step seems to be the media players," Rouland said.
One worm discovered in November 2006 launches a corrupt Web site without prompting after a user opens a media file in a player. Another program silently installs spyware when a video file is opened. Attackers have also tried to spread fake video links via postings on YouTube.
That reflects the lowered guard many computer users would have on such popular forums.
"People are accustomed to not clicking on messages from banks, but they all want to see videos from YouTube," Rouland said.
Another soft spot involves social networking sites, blogs and wikis. These community-focused sites, which are driving the next generation of Web applications, are also becoming one of the juiciest targets for malicious hackers.
Computers surfing the sites silently communicate with a Web application in the background, but hackers sometimes secretly embed malicious code when they edit the open sites, and a Web browser will unknowingly execute the code. These chinks in the armor could let hackers steal private data, hijack Web transactions or spy on users.