Epeat eco-benchmark covers more hardware

Cozier, Muriel
July 2006
ICIS Chemical Business;7/31/2006, Vol. 1 Issue 30, p36
Trade Publication
The article focuses on Electronic Product Environmental Assessment Tool (Epeat), an easy-to-use tool that will help purchasers rank computer equipment, based on its environmental attributes, developed by the U.S. Environmental Protection Agency (EPA). The EPA said that Epeat was already referenced in some U.S.$32 billion worth of computer contracts, including those issued by the U.S. Department of Defence and Department of Homeland Security as well as hospitals and healthcare sites.


Related Articles

  • Government flunks IT security. Carlson, Caron // eWeek;3/20/2006, Vol. 23 Issue 12, p20 

    This article explains that the U.S. House Committee on Government Reform issued a report card on the information technology security of administrative agencies. A rating of F went to the agencies involved in counterterrorism efforts, the Department of Homeland Security and the Department of...

  • Pentagon, DHS Working Cybersecurity Pilot Program. Munoz, Carlo // Defense Daily;3/18/2011, Vol. 249 Issue 52, p2 

    The article offers information on the Cybersecurity Pilot Program being run by the U.S. Department of Defense (DoD) and the Department of Homeland Security (DHS). It is stated that DoD and DHS are working on a new joint effort to protect several defense industry networks from cyber crimes. Under...

  • Life and Death in the Cybersphere. Fulghum, David A. // Aviation Week & Space Technology;11/1/2010, Vol. 172 Issue 40, p64 

    The article focuses on the U.S. Defense Department's (DD) plans for organizing cyberspace operations and security. Deputy assistant defense secretary Robert Butler said that the DD strategy has five sections: Cyberspace as a separate operational domain with its own command, operational concepts...

  • What can we learn from the US government's embarrassing security failures?  // SC Magazine: For IT Security Professionals (UK Edition);Aug2007, p11 

    The article explores the lessons that Great Britain can derive from the computer security failures of the U.S. government. Some of the computer security failures of U.S. government agencies, include the breach of the Department of Defense's e-mail systems by a hacker in June 2007 and the...

  • Cyber Espionage and Insurance Coverage. Alessandro, Alba // Security: Solutions for Enterprise Security Leaders;Feb2014, Vol. 51 Issue 2, p42 

    The article focuses on the cyber-espionage and cyber crimes in U.S. It says that the U.S. Department of Defense has classified security networks were compromised by foreign cyber-espionage in 2008. It states that 150 computers in the U.S. Department of Homeland Security 's $1.75 billion computer...

  • Pentagon Expanding Program to Share Cyber-Security Intelligence With Private Sector.  // CIO Insight;5/14/2012, p1 

    The article reports on the expansion program of the U.S. Department of Defense (DoD) which can increase sharing of cyber-security intelligence with the private sector. The DoD is collaborating with the Department of Homeland Security (DHS) to improve network defenses. Deputy secretary of...

  • DHS, DoD Agree To Align Civil, Military Cyber Protection. Biesecker, Calvin // Defense Daily;10/14/2010, Vol. 248 Issue 9, p8 

    The article provides information on the announcement of joint operational coordination by the U.S. Department of Defense and the U.S. Department of Homeland Security for the nation's cyber security. It states the joint operation to encourage personnel sharing in the security missions, and define...

  • Getting wise to continuing education. Armstrong, Illena // SC Magazine: For IT Security Professionals (15476693);May2010, Vol. 21 Issue 5, p4 

    The author stresses the importance of continuing education in the information security sector in the U.S. She notes that this is recognized by the Departments of Defense and Homeland Security that they require their information technology (IT) staff to have and maintain at least one approved...

  • Recent Incidents Intensify Worries of Chinese Espionage in the United States. Weitz, Richard // World Politics Review (19446284);11/ 9/2007, p1 

    The article reports on recent incidents of computer hacking in the U.S. which intensify concerns on Chinese espionage in the country in 2007. It has been revealed that computer hackers based in China were able to penetrate U.S. computer networks, including those operated by the Departments of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics