TITLE

Safety Net

AUTHOR(S)
Whittle, Sally
PUB. DATE
April 2004
SOURCE
IT Training;Apr2004, p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
John Halamka heads the information technology department at Harvard Medical School in the U.S. and also works as chief information officer for CareGroup Healthcare System, a private healthcare provider in the Boston area. A glitch in part of the hospital's computer network meant that traffic was being misrouted, creating a loop that was overwhelming the rest of the network. An auditor appointed to investigate the problem said that the hospital's network, used to deliver vital medical applications, was' a cutting-edge infrastructure, for 1996. All network staff should have a strong grounding in the fundamentals of the data network architecture, regardless of what technology is being used. The transmitter is normally a WiFi-compatible PC card in a laptop, and the receiver is a WiFi access device, which needs to be installed by the network manager, and acts as an access point to the corporate network. A virtual private network allows companies to provide secure access to workers who may not be connected to the network. INSETS: Case study;New network training.
ACCESSION #
13648379

 

Related Articles

  • ARRAY NETWORKS HELPS TELENOR IMPLEMENT WIRELESS HOTSPOTS.  // Tele-Service News;Aug2008, Vol. 20 Issue 8, p1 

    The article reports on the deployment of Array Networks' Sequenced Packet Exchange Secure Socket Layer Virtual Private Line (SPX SSL VPN) technology to be integrated into Telenor's next generation nationwide Wireless Fidelity (WiFi) network and wireless hotspot deployment. This service will...

  • Encryption in Business. Pabrai, Uday O. Ali; Olzak, Tom // Certification Magazine;Feb2005, Vol. 7 Issue 2, p34 

    This article examines the deployment of virtual private networks (VPN), secure sockets layer (SSL) and Wireless-Fidelity protected access (WPA) technologies into the infrastructure fabric, in an attempt to address the challenge of confidentiality in the transmission of sensitive information....

  • THE TECHNOLOGY COACH How Secure Is Your Wireless Connection? Skiles, Dan // Investment Advisor;Aug2013, Vol. 33 Issue 8, p55 

    The article offers the author's insights on information security in wireless connections and networks. He mentions the importance of at least understanding the security level offered by wireless networks due to its difference. He considers wireless fidelity (Wi-Fi) based network as the most...

  • Protect your buzz. Mansfield, Barry // SC Magazine: For IT Security Professionals (UK Edition);Jun2008, p34 

    The article discusses the security risks of mobile working and how to address them. Virtual private networks (VPN) are an attractive target for hackers for they often allow full access to the internal network. VPN that are secured using Secure Socket Layer (SSL) can be vulnerable to simple...

  • 10 predictions for 2004.  // Network World;1/5/2004, Vol. 21 Issue 1, p32 

    Editorial. Presents predictions for the computer industry in the U.S. for 2004. Federal government's support on IEEE 802.11i as the preferred wireless LAN security model; Emergence of utility computing; Increase in the usage of virtual private networks.

  • My Dog Has Pleas. Cringley, Robert X. // InfoWorld;11/24/2003, Vol. 25 Issue 46, p14 

    Comments on the activities of two companies in the U.S. information technology industry, as of November 2003. List of slogans used by the Comdex show in the Las Vegas Convention Center; Alleged reason behind the slow release of wireless fidelity networking chips by Intel.

  • spectrum.  // Government Technology;Oct2010, Vol. 23 Issue 10, p48 

    The article discusses several issues on information technology including the decision of Southwest Airlines to offer wireless-fidelity (Wi-Fi) to its passengers and the result of a survey conducted by Harris Interactive on how long Internet users spend per week online.

  • Automating Configuration System and Protocol for Next-Generation Home Appliances. Eun-Seo Lee; Hark-Jin Lee; Kwangil Lee; Jun-Hee Park // ETRI Journal;Dec2013, Vol. 35 Issue 6, p1094 

    Home appliance manufacturers have recently been trying to provide smart products capable of various Internet services. For example, one health care manufacturer provides a Wi-Fi-capable scale. Once users register their information with the manufacturer's server, their weight and body fat records...

  • How iPass Ignored the Wi-Fi Hype and Gained All-Access Entry to the Enterprise. O'Shea, Dan // Wireless Review;Oct2003, Vol. 20 Issue 10, p28 

    Describes the efforts of virtual network operator iPass on utilizing the effects of wireless fidelity (Wi-Fi) technology. Details on the initial public offering filed by the company on July 23, 2003; Views of Ken Denman, chairman and CEO, on the focus of the company; Wi-Fi services and products...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics