Google Verizon in talks on net neutrality deal?

Google Verizon in talks on net neutrality deal?
Google and Verizon are reportedly in talks over how to manage network traffic, an agreement that could influence how U.S. regulators view network neutrality, according to a report in Thursday’s Wall Street Journal.

Verizon confirmed the talks have been ongoing with Google and the U.S. Federal Communications Commission (FCC) for 10 months, the paper reported Microsoft MCTS Training.
Cloud Computing eGuide: Download now

Don’t Miss! How Google wants to change telecom

The agreement would apparently lay out principles around network neutrality, or the belief that service providers should not slow down certain kinds of traffic on their networks. The agreement, however, would reportedly allow service providers to prioritize traffic if customers paid for that kind of service, the paper said.

Network providers have maintained that they need to restrict some kinds of Internet traffic in order to keep a consistent quality of service across their customers bases. That has happened, for example, for file-sharing protocols such as BitTorrent. But it is feared that network providers may unfairly restrict other kinds of applications and protocols for competitive purposes. Wireless networks would not be subject to the agreement, according to the report.

The FCC has been talking to large service providers about how to regulate net neutrality. That has drawn criticism from groups such as Public Knowledge, whose communications director wrote that any agreement between Google and Verizon could be short-lived as it wouldn’t have the force of law.

A Google-Verizon deal “is no substitute for a legally binding, comprehensive agreement in the public interest that covers not only network management but universal service and the other issues rolled up in the larger question whether the FCC even has the authority over broadband,” wrote Art Brodsky on the group’s blog.

The DC Circuit Court of Appeals threw a major wrench in the Federal Communications Commission’s plans to implement network neutrality regulations today when it ruled that the FCC had no authority to regulate ISPs’ network management practices Microsoft MCITP Certification.

Google officials contacted in London said they had no comment.

5 Windows 7 security features businesses need to know about Part II

5 Windows 7 security features businesses need to know about Part II
Each profile type has its own selection of applications and connections allowed through the firewall. For instance, in a home or small-business network marked Private, you might allow file and printer sharing, while on a network marked Public, you would likely disallow access to your files.
Oracle Database 11g: Defense-in-Depth Solutions for Security and Compliance: Download now

Vista’s firewall profiles worked well except when a computer was connected to multiple networks simultaneously, such as an Ethernet and a wireless network. In those cases, the system would default to the most restrictive profile. This could cause problems when, for example, connecting to a corporate VPN through a public Wi-Fi hot spot; Vista would recognize simultaneous connections to both a public and domain network and apply the public profile to both.

All versions of Windows 7 allow computers to keep several firewall profiles active at the same time, maintaining the access and functionality of the more trusted network while blocking access via the less trusted network. Since many remote access functions require less restrictive firewall settings, users can now work securely while remaining protected from threats outside of the corporate network.

With fingerprint readers becoming more and more common on laptops, establishing a standard for the handling of biometric data has become important. Enter Windows Biometric Framework, a standardized method for storing fingerprint data and accessing it through a common API. Although most of the features of this subsystem are of interest only to developers, there are two important things that businesses should know Microsoft MCTS Training.

First, while fingerprint scanners could formerly be used to log onto a computer but not to log onto a corporate domain (a corporate network or network subsection), the Windows Biometric Framework allows domain log-in.

Second, users can store up to 10 unique fingerprints, one for each finger. While most of us probably don’t expect to lose a finger anytime soon, having all 10 fingers enrolled in the system is a good precaution in case of lesser injuries. A cooking accident or a hand caught in a door can easily modify a finger enough that it won’t register correctly with a fingerprint reader, and you don’t want a user to be barred access to his computer while he heals.

Fingerprints are added using the Biometric Device applet, which appears in the Control Panel of any Windows 7 computer with a fingerprint scanner attached and from which you can enable computer and domain log-in. You must be logged in as an administrator to add or manage fingerprints on Windows 7.

BitLocker To Go

One of the most serious security threats facing today’s businesses is the loss of a mobile asset containing confidential corporate information. Windows Vista’s BitLocker began to address this problem by allowing business users to encrypt a laptop’s entire hard drive so that if it were lost or stolen, nobody could access the information stored on it. BitLocker To Go extends the same protection to even more easily lost external drives, including pocket-size hard drives and tiny flash drives Microsoft MCITP Certification.