The music industrys subpoena deluge raining down on Internet service providers has sparked concerns about the wisdom of handing user identities and addresses to parties other than law enforcement. ISPs are growing worried that special subpoena powers could be abused, and providers could be caught in the position of revealing personal information to copyright holders […]
WASHINGTON—In the ongoing effort to spur greater coordination among federal agencies, industry, law enforcement and academia in addressing network vulnerabilities and warding off future attacks, the Department of Homeland Security is putting together a National Cyber Security Summit, tentatively scheduled for late fall. Policy-makers, on Capitol Hill and in the administration, are leery of promulgating […]
In a concerted effort to push Internet-based voice and multimedia services into the large-enterprise market, Nortel Networks Ltd. and Bell Canada are developing a new IP-based network and beefing up their joint research initiatives. Down the road, they plan to expand the project to be able to provide similar new services to small and midsize […]
In an effort to further distinguish itself in next-generation telephony, Avaya Inc. will highlight wireless connectivity and its IP-based systems in networks installed for the Womens World Cup soccer tournament, which opens later this week. Avaya provided the communications gear for the Mens World Cup in Japan and South Korea last year, and it is […]
WASHINGTON—The Department of Homeland Security has tapped Amit Yoran, formerly vice president for Managed Security Services at Symantec Corp., to lead the agencys cyber-security division. Yoran, whose appointment will be formally announced tomorrow, will be charged with implementing the Administrations cyber-security strategy. In another move to fortify the countrys online infrastructure, the department is creating […]
Still looking for new ways to cut costs, 3Com Corp. plans to close its Dublin manufacturing plant over the next six months and shift the work to outsourced labor, primarily in Asia. The manufacturing and distribution of enterprise networking gear will be handled externally, and 3Com will focus its internal research and development on high-end […]
In the hands of a government preoccupied with security, data mining technologies raise the specter of intrusiveness to Orwellian proportions. But developers of such technology, who have grown weary of seeing it held out as some kind of bogeyman, say data mining technology, like many others, was designed for good. Researchers from academia and industry […]
The recent rash of worm attacks targeting Microsoft Corp. products has industry experts questioning the wisdom of a five-year, $90 million deal that made the Redmond, Wash., company the primary provider of desktop and server software for the Department of Homeland Security. The late-August Blaster and SoBig.F attacks caused network interruptions at the Maryland Department […]
After six months of delay, the Federal Communications Commission finally released rule changes Aug. 21 on local telephone competition and broadband network deployment, leaving the question of the status of local telephone competition largely to state regulators. For business users, the FCCs action could result in a changing array of choices, depending on state actions. […]
Peer-to-peer traffic over the enterprise network is a constantly moving target, particularly for universities where users tend to have time on their hands for evading control tools. Ever-evolving P2P methods, combined with efforts by the Recording Industry Association of America to crack down on illegal downloads, create a healthy climate for makers of traffic management […]