ISPs butt heads at NW showdown

Pappalardo, Denise
October 1998
Network World;10/12/98, Vol. 15 Issue 41, p8
Trade Publication
Reports on the need for Internet service providers to improve customer services, according to five executives during the 1998 Internet World Trade Show. Difficulties in providing beyond best-effort services; Virtual private networks for businesses; Internet security protocol.


Related Articles

  • A personal touch. Biagi, Susan // Telephony;10/02/2000, Vol. 239 Issue 14, p88 

    Focuses on the responsibility of Internet service providers of ensuring the safety of their customers' networks. Statistics on the number of security breaches reported by companies; Challenge faced by companies in dealing with security problems; Information on the security offerings from Exodus...

  • Can you dig it? McClune, Emma // Total Telecom Magazine;Apr2003, p24 

    Reports on the Internet Protocol tunnels launched by several pan-European carriers to allow remote office access to corporate virtual private networks (VPNs) in isolated instances. Information on the Internet gateway that will be launched by Equant in April 2003; Price of the Internet VPN...

  • SingNet secretly scans its customers' computers.  // Telecom Asia;Jun99, Vol. 10 Issue 6, p12 

    Reports that some Internet surfers in Singapore are finding the official explanation about SingNet's scanning of the personal computers of its customers as either unconvincing or disturbing. Internet access arm of Singapore Telecom; Claim that the scan was to detect computer viruses; Failure of...

  • High-speed Internet access can be harmful to your health, and the health of your PC. Livingston, Brian // InfoWorld;10/18/99, Vol. 21 Issue 42, p51 

    Talks about effective security features for high-speed Internet access. Advantages of using cable modems and Digital Subscriber Line in obtaining high-speed Internet access; Advice from Internet experts on how to protect high-speed Internet users from hackers.

  • A New Promising IP Traceback Approach and its Comparison with Existing Approaches. Bhaskaran, V. Murali; Natarajan, A. M.; Sivanandam, S. N. // Information Technology Journal;2007, Vol. 6 Issue 2, p182 

    The problem of identifying the sources of a denial of service (DOS) and distributed denial of services (DDoS) attack is hardest in the Internet security area, because attackers often use incorrect or spoofed source addresses of IP packets. IP traceback system is to identify the origin of IP...

  • A Trustworthy Network Architecture based on Strengthen TNC. Ansheng YIN; Shunyi ZHANG // International Journal of Digital Content Technology & its Applic;Sep2012, Vol. 6 Issue 17, p343 

    As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper outlines the background, concept, evolution and basic properties of the trustworthy network, and projects the future development of the...

  • Watchdogs on the Internet. Bucholtz, Chris // Telephony;05/05/97 Supplement, Vol. 232 Issue 18, p10 

    Talks about the complex security solutions provided by Internet service providers (ISPs). Two types of threat; Break-in within corporate networks; Development of firewalls; Data encryption standard and Triple DES encoding systems employed by VPNet. INSET: `Dark Tangent' flames telco security,...

  • AVOID MARKETING ATTRACTIVE WEB NUISANCES. Baltazar, Henry // eWeek;07/10/2000, Vol. 17 Issue 28, p88 

    Comments on the accountability of Internet administrators and Internet service providers in the maintenance of Web infrastructure security. Impact of the large number of unsecured Web presences on the Internet; Vulnerability of Internet infrastructure to attacks by computer hackers.

  • The Cyber Genie is Out of the Bottle. Dunkel, Dan // SDM: Security Distributing & Marketing;Jun2009, Vol. 39 Issue 6, p46 

    The article presents the author's comments about Internet security in the U.S. The author says that businessmen need to understand that the threat to Internet security is real and a growing concern for their customers. According to him, companies need a security policy that blends physical and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics