FROM Bailing Wire TO Biometrics

Adelson, Jay
March 2005
Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p18
Trade Publication
Focuses on the development of a new design of datacenter, known as Internet Business Exchange, at Equinix Inc. in the U.S. Requirements for the development and establishment of the new datacenter on the construction plan of the building; Significance of the use of advanced software with biometrics for the security of the new datacenter; Total number Internet datacenter hubs operate by the company.


Related Articles

  • Start-up aims to ease 'Net overload. Gittlen, Sandra // Network World;10/19/98, Vol. 15 Issue 42, p14 

    Features computer start-up company Equinix of Redwood City, California, which provides facility for peering of internet service providers. Entry into the Internet traffic exchange; Planned sites; Founders; Source of fund.

  • Equinix Posts Q4 Revenue of $638 Million, up 13% YoY.  // Green Data Centers & Internet Business Newsletter;Feb2015, Vol. 13 Issue 2, p16 

    The article reports that data center and Internet provider Equinix has posted 638.1 million dollar revenue for the fourth quarter of 2014 which was 3% increase over the previous quarter.

  • IDENTIFYING PEER-TO-PEER TRAFFIC ON SHARED WIRELESS NETWORKS. Piel, Simon; Jung, EJ // Proceedings of the Conference on Digital Forensics, Security & L;2013, p25 

    Tracing contraband downloads leads investigators to an IP address, and in turn Internet Service Providers (ISP) can provide a physical location using this IP address. However, most homes and offices share this IP address among many computers using wireless networks. In other words, there needs...

  • Barracuda Introduces New Features.  // Database & Network Journal;Dec2009, Vol. 39 Issue 6, p25 

    The article reports on the addition of new features by Barracuda Networks Inc. which target larger service providers and enterprise customers. It cites the additional features such as delegated administration which enables customers to customize their own filtering system, new administrative...

  • Study finds ISPs calm in the hacker storm. Wilson, Carol // Telephony;9/24/2007, Vol. 248 Issue 15, p17 

    The article reports on the findings of the study of Arbor Networks company on how Internet service providers (ISPs) address security issues in the U.S. It reveals that ISPs believe that they can mitigate Internet attacks due to their huge dollar investments on security infrastructure. It also...

  • ISPs could cash in on security services for UK Internet users. Armitt, Claire // New Media Age;7/14/2005, p11 

    This article reveals that Internet service providers (ISPs) could make profit on security services for Internet users in Great Britain. Half of Internet users in the country would pay their ISPs to protect them from viruses and spam, claims new research from Internet security company Preventon....

  • THWARTING THE ZOMBIES. Fisher, Dennis // eWeek;3/31/2003, Vol. 20 Issue 13, p25 

    This article focuses on the possible implications of distributed-denial-of-service (DDoS) attacks on Internet service providers. Downstream Internet service providers and their end users can be suddenly shut off. Traffic in several segments of the global network may slow down and take several...

  • EBay accounts exposed.  // APC (Bauer Media Group);Jul2005, Vol. 25 Issue 7, p18 

    This article reports that flaws in eBay Inc.'s security systems and customer assistance model have been exposed after an Internet service provider caching issue allowed several customers to access each other's accounts without passwords. In March 2005, a few AAPT users reported finding...

  • An Enduring Relationship between Biometric Traits and Security Systems. Hashim, Ahmad Yusairi Bani; Jamaludin, Zamberi // International Journal of Research & Reviews in Information Secur;Mar2011, Vol. 1 Issue 1, p1 

    Security is an important aspect in all environments. Security is related to safety. Safety is one of the elements that completes one's requirement for a meaningful live that leads to self-actualization. In fact, industrial security standards impose the use of security measurement for systems...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics