Grasping all dimensions of cyber-security in 2000 has been a challenge. Enterprise security in the new millennium just isn’t what it used to be. In the good ol days–a couple of years ago–firewalls were for servers, and the Internet was for desktops and laptops, not mobile telephones or PDAs. E-mail brought documents from business partners, […]
Electronic/digital signatures accomplish three goals: protection from data tampering; signature authentication; and nonrepudiation, which means all parties are legally bound by digitally signed agreements. To endow transactional parties with the ability to establish digital signature mechanisms to make online contracts and transactions legally binding, President Clinton, on June 30, 2000, signed into law the Electronic […]
Carnivore, the Federal Bureau of Investigation’s new software, sounds as nasty as its name: technology that gulps and spews digital debris disguised as nuggets of righteous data, enabling access to all traffic over an Internet service provider’s network, including the e-mail of every ISP customer and all who communicate with them. Essentially, the FBI installs […]
It was no surprise to hear Brian Snow, the senior technical director of the National Security Agency’s Information Systems Security Organization, tell an audience of security tool developers that a lot of the products they make are an “attractive nuisance.” Snow made these comments during a presentation to developers attending the July 2000 “sophisticated” hacker […]
Cyber-stats can alert you to potential security holes in your firm. Piles of statistics are surfacing regarding cyber crime and the losses accumulating from poor security. Some research and the statistics it generates is based on assumption and opinion, hopefully in the form of interactive models. Other studies are based on interviews and analysis. Still […]
Who would have guessed that telecommuting would get beyond talk for those dependent on IT to get their jobs done? With computing now mobile and offsite, e-security requirements abound. It’s now time to practice safe computing for everyone from CEOs to programmer-analysts working online and offsite. This rubber-to-road realization was caused by new technology capabilities […]
Microsoft Corp.’s latest operating system, Windows 2000, goes far beyond incremental improvements over Windows NT. Aimed toward high-end computing emphasizing reliability, scalability, and cost benefits compared to other OSes, this business platform offers a variety of security features under “one roof.” Windows 2000 leverages those security features available in Windows NT by adding several features […]
Business-to-business (B2B) e-commerce will grow at aggressive rates through 2004, causing fundamental changes to the way businesses do business with each other, according to GartnerGroup, a leading IT advisory firm. According to Gartner, the worldwide B2B market is forecast to grow from $145 billion in 1999 to $7.29 trillion in 2004. By 2004, B2B e-commerce […]
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.