Search

Results 41-60 of 64 for Andrew Burger.

Network Security, Part 2: NAC Moves Up the Architecture

Businesses and large institutions dreaming of enforcing consistent security policies are finding solace in network access control -- programs that establish authentic users, identify network devices, perform integrity checks, take remedial actions and authorize access to information system resources...

Network Security, Part 1: The Buzz About Network Access Control

Demand is high for a super system that can promise protection from external threats while organizations' networks, data and software applications become increasingly interconnected. Since Cisco Systems coined the term and released its first "network access control" system in 2003, interest in NACs h...

At the Movies: Digital Delivery Takes Off, Part 2

Digital cinema distribution and projection systems are gaining momentum, while the film industry is seeking new ways to pack theaters. The new formats not only offer film studios, distributors and cinema operators significant cost reductions, but also provide unrivaled viewing experiences that compe...

At the Movies: Digital Delivery Takes Off, Part 1

It was a time-tested tactic during ancient Roman times for generals to embrace their adversaries and bring them into the fold when they represented significant threats to the Empire that they could not otherwise defend against. A modern variation of this practice is becoming common across the media ...

The Mushrooming Menace of Keyloggers

Few things are as disturbing to Internet users as the thought of someone spying on them and capturing their every keystroke. Unfortunately, this has been happening more frequently as the use of keyloggers, phishing and spoofing grows. In 2006, Keylogging was the fastest-growing type of malware in w...

Building the Case for Biometrics

Biometrics -- or biometric authentication -- refers to technology that measures and analyzes human physical characteristics for security purposes. Physiological, or biometric, characteristics include, for instance, eye retinas, facial patterns and hand or foot measurements, whereas examples of behav...

How Tough Is Vista’s Defensive Lineup?

It's open season on Windows Vista for hackers, crackers and virus and malware propagators. As any IT manager will recall, malware incursions and zero-day exploits of Windows, Internet Explorer and Office applications were all too common in 2006. Therefore, security providers and IT staff across orga...

The Bumpy Road to Mobile Media Convergence

Industry participants and observers are looking for big things to happen in the smartphone space this year. A bevy of emergent technical standards and formats constrain the distribution of content that should be available to smartphone users -- for example, more and varied information, communication...

The March of the Smartphones

2006 was a pivotal year for the smartphone industry, with significant developments in areas both technological and in terms of industry practices and operation. As handset manufacturers continued to accessorize the smartphone and churned out a seemingly limitless variety of models and styles, substa...

Silicon, Solar Power and Corporate Responsibility, Part 2

Indications are that 2007 will be a bumper year for the solar power and renewable energy industry, as was noted in Part 1 of this two-part series. As an increasing number of state governments are introducing renewable power and energy standards and incentives, Washington, D.C., lawmakers at the clos...

Silicon, Solar Power and Corporate Responsibility, Part 1

The renewable energy snowball is gaining momentum, spurring the evolution of a full-blown economic ecosystem -- from small local businesses selling and installing solar PV systems for the residential retrofit market to large-scale commercial and residential installations that involve public and priv...

Renewable Energy in America, Part 2: Solar Powered Homes

With the introduction of the California Solar Initiative -- due to go into effect January 1 -- solar photovoltaic industry firms are scrambling to adjust to changes in application processes, rebate pricing, and energy efficiency and metering requirements. Some are using California as a test bed for ...

Renewable Energy in America, Part 1: A Changing Climate

Some 450 leaders from the U.S. renewable industry's policy, financial and technology sectors assembled on Capitol Hill on November 29-30, meeting with members of Congress and government agency officials during the American Council on Renewable Energy's fifth annual national policy conference. Broadb...

BAA Tests Biometric Security System at Heathrow

The British Airport Authority on Wednesday announced that it has launched a limited scale trial of three integrated, biometric-driven security systems at London's Heathrow airport. The miSense, miSenseplus and miSenseallclear systems are designed to speed up and simplify passenger check-in, boardin...

BEST OF ECT NEWS

Green Energy, Part 1: The Second Coming

It seems rarer than ever these days that a majority of Americans can get together, rally round a common cause, hash out their differences, and forge a consensus in support of a durable and lasting approach to a pressing and vital public issue. Yet that is what is happening as a groundswell builds fr...

CASE STUDY

Going Wireless on Campus

Wireless networking continues to make inroads in metropolitan and rural areas across the U.S. as the development of 802.1x technologies and associated standards forges ahead. Wireless broadband and VoIP have both gained momentum and are moving inexorably forward. It's now possible to connect to the ...

The Changing Faces of Internet Security Threats, Part 2

As the nature of Internet threats has morphed, IT systems professionals and security providers have adapted their response tactics. Increasingly, organizations are developing comprehensive security strategies and implementing a variety of online and on-demand security applications and services acros...

The Changing Faces of Internet Security Threats, Part 1

It's a sad fact of life for today's information-driven organizations that the nature of security threats is continuously shifting and evolving. Intrusion mechanisms such as worms, Trojans and rootkit exploits continually evolve into more-developed forms, and wax and wane in terms of number and frequ...

Network Security: Continuing Education for Campus IT Departments

University network and IT environments are characterized by their diverse and constantly changing nature, large scale and wide scope. Today, that means wireless networks, Voice over Internet Protocol, mobile phones and other digital gadgets must be woven into existing network and computing infrastru...

Green Energy, Part 4: Not Politics as Usual

For many people in the biofuels movement, it is inspiring to witness and play even a small part in the huge amount of grass roots-driven, Web-based activity the energy issue is presently generating in the U.S. All this concern and activity raises a crucial question: To what degree is all this activi...

Technewsworld Channels