Policy+networks

Showing results 1 to 20 of 20

LisbonCouncil

The Lisbon Council is a Brussels-based think tank and policy network.Established in 2003 in Belgium as a non-profit, non-partisan association,...

March 23, 2014 by Karakas Digital

Election rant 1: wireless greed

The Liberals say their wireless-based NBN is cheaper and faster to build than Labor's fibre. What they do not say is that their policy would nationalise our 4G wireless spectrum, derail private investment in 4G networks, and force rural Australians to suffer the status quo until at least 2014.

August 12, 2010 by

Coalition unveils broadband policy

The Coalition has unveiled its $6 billion rival broadband policy to Labor's National Broadband Network project, with the central planks being a competitive backhaul network, regional and metropolitan wireless networks and an ADSL enrichment program that will target telephone exchanges without ADSL2+ broadband.

August 9, 2010 by

State Policy Network Annual Meeting

The State Policy Network Annual Meeting application. Find specific information about the SPN annual meetings as well as general content...

July 20, 2011 by State Policy Network

Controversial counter-terror policy in UK education networks

The UK government in recent weeks has strongly advised colleges and universities to monitor networks for Islamic fundamentalism and extremism. With the release of a "toolkit" by the Department for Innovation, Universities and Skills, students are asking questions about their civil liberties.

February 27, 2009 by

IT Dojo: Disable USB storage under OS X or Windows

Hollywood would have IT pros believe that the biggest threat to network security comes from international super hackers or high school kids trying to download games like global thermonuclear war. In reality, we face a more mundane threat--our end users, particularly those wielding USB storage devices.These pocket-sized devices can store a large amount of data. But even if your users aren't planning to cart off sensitive company files, USB storage devices (external hard drives, camera, memory stick, MP3 players, etc.) can be a headache in other ways. Employees may use your networks to download music to their USB-based MP3 players. New USB flash drives, such as SanDisk's U3 smart drives, can even run software directly from the device--a perfect tool for the end-user who wants to run unauthorized software on your network.If your concerned about USB storage devices on your network and don’t feel a written policy alone will protect your data, disabling the devices is your next step.In this IT Dojo video, Bill Detwiler, TechRepublic's Head Technology Editor, shows you how to disable USB storage devices on both Apple OS X and Windows. The United States National Security Agency (NSA) described the process in a March 2008 document from the agency's Information Assurance Directorate.Once you've watched this IT Dojo video, you can read the original TechRepublic article, download PDF version of this tip, and learn more about mitigating the risks poses by USB storage devices from our IT Dojo blog.

April 28, 2008 by

Frontier Centre

The latest from one of Canadas leading public policy think tanks straight to your phone, including text, audio, and video in iPhone/iPad/iPod...

February 3, 2011 by State Policy Network

Govt to appoint next-gen telco adviser

Government policy surrounding next generation networks (NGN) will be shaped by the appointment of an external consultant to advise on regulatory issues.The Department of Communications, Information Technology and the Arts (DCITA) will appoint a consultant to prepare a report on next generation networks and their implications for consumers, government and industry, according to a request for tender issued by DCITA.

January 17, 2007 by

Securing Wireless LANs: Authentication

Inherently flawed security protocols and a strong grassroots push to adopt wireless local-area networks (LANs) are creating substantial security risks for enterprises. The first priority should be to establish a comprehensive policy to address wireless de

May 13, 2003 by

Devise an intrusion response policy

Putting devices and software in place to protect networks from viruses and intrusions is the first and sometimes easiest part of securing a network. But many administrators overlook the next and more difficult task: establishing a policy for handling vuln

July 7, 2002 by

3G: Don't believe the hype

While some think third-generation wireless networks will be viable and necessary, Wharton public policy and management professor Gerald Faulhaber is pessimistic about the future of 3G.

June 23, 2002

Securing remote users

As more employees access corporate networks remotely, it's tougher to enforce security policies. But companies such as InfoExpress are working hard to make policy management easier for you.

May 9, 2002 by

Securing remote users

As more employees access corporate networks remotely, it's tougher to enforce security policies. But companies such as InfoExpress are working hard to make policy management easier for you.

May 7, 2002 by

Europe plans convention on Cybercrime

The Council of Europe Ministers' Deputies has approved the first international convention on cybercrime, which will set a common criminal policy on the misuse of computer networks and electronic information for terrorist or illegal activity.

September 24, 2001 by

Proposed treaty cracks down on cyberterrorists

The Council of Europe Ministers' Deputies has approved the first international convention on cybercrime, which will set a common criminal policy on the misuse of computer networks and electronic information for terrorist or illegal activity. The draft will be presented to a meeting of foreign affairs ministers in Strasbourg on November 8, with the so-called "opening for signature" by member states taking place at an international conference in Budapest at the end of November.

September 23, 2001 by

International cybercrime treaty gets go-ahead

LONDON--The Council of Europe Ministers' Deputies has approved the first international convention on cybercrime, which will set a common criminal policy on the misuse of computer networks and electronic information for terrorist or illegal activity. The draft will be presented to a meeting of foreign affairs ministers in Strasbourg on Nov.

September 20, 2001 by

RealNetworks adds missing privacy statement

After being roundly criticized for secretly collecting data from users, media streaming software maker Real Networks Inc. revamped its privacy policy, adding a statement explaining that the company collects globally unique identifiers, or GUIDs, on Monday.

October 31, 1999 by

New Bay boss wants to steady the boat

Bay Networks is planning a return to the big time with a steady as she goes policy that rides on the back of an Internet-inspired surge in the networking market, its new boss told visitors to the Networld+Interop show in Las Vegas this week.David House, recently installed president, CEO and chairman of Bay, said the firm will concentrate on core growth areas such as switching, service provider equipment, remote access and network management.

May 9, 1997 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories