Thursday, March 19, 2009

As happy as a rock star in a pig pen

Fair-use doctrine in a video game
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Spotlight Story
As happy as a rock star in a pig pen

M. E. Kabay By M. E. Kabay
Just how far does copyright extend? I ran across an interesting case recently during my research for an intellectual-property yearly review that might illuminate concepts of fair-use doctrine. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Avoid conflicts over intellectual property As I continue my research on intellectual property law developments in 2008, I came across an interesting (and sad) case that stimulated ideas that may be useful for both consultants and clients working together on ...

Trademarks as keywords for targeted ads? I've been doing research for my annual review of intellectual property law and have had a great deal of fun learning about all sorts of interesting new developments. Here's a case that might interest readers who work in commercial organizations with valuable trademarks but that raises unexpected questions about freedom of speech.

Abiding by the law: Blueport vs. U.S. I've been preparing my annual review of intellectual property law developments for my friend and colleague Prof. Tom Peltier's Peltier Effect (see the 2007 edition for a sample), and I ran across a startling case of the U.S. government's assertion of the doctrine of sovereign immunity.

Swiss mix: Useful copyright resource I was updating one of my lectures on copyright law recently and ran across a useful site from the government of Switzerland's Federal Institute of Intellectual Property. The site, available in German, French, Italian, and English versions, has some stimulating materials about intellectual property that may be useful to readers involved in security-awareness campaigns. Some readers may also want to pass on the information to their children or to teachers in their local communities.

Large tech firms praise patent reform bill Several large technology vendors praised a U.S. patent reform bill introduced this week, but other groups slammed the legislation, saying it would water down intellectual property rights.

Copyright infringement and the CISSP, Part 2 In Part 1 of this series, security-awareness expert K Rudolph of Native Intelligence describes how she discovered that a CISSP-holder whom she is calling "Mud" submitted 11 of her posters to a contest after stripping ...

Copyright infringement and the CISSP, Part 1 This story deals with lying, theft, social networking, law, mystery, and an uncertain outcome. My longtime friend and colleague, the distinguished security-awareness expert K Rudolph of Native Intelligence tells a tale ...

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by HP
rule

HP 5 Questions to Ask about Network Automation
Visibility into the global network is key to maximum uptime. You can't fix what you can't see and having a view into the global network ensures the ability to; identify and resolve problems quickly, prevent configuration mistakes, enforce best practices and manage the network from a central location. Learn what to ask when evaluating your network management system. Read this whitepaper today.

rule

Optimizing Systems Management.
IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today.
Download this whitepaper today.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/19/09

Today's most-read stories:

  1. Computer science major is cool again
  2. Report: IBM is in talks to buy Sun
  3. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  4. Apple previews Version 3.0 of iPhone OS
  5. Cisco rivals size up UCS with usual reaction: caveat emptor
  6. Google Voice: GrandCentral grows up!
  7. Road signs hacked in NYC
  8. What Cisco's UCS means to management vendors?
  9. Web inventor Berners Lee conned by fake Web site
  10. A 10-piece sampler from Microsoft's patent pipeline
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment