| Google, Louis Vuitton face off in trademark spat Europe's highest court will hear a trademark infringement suit concerning Google's keyword advertising system, a case that ventures into an untested area of law that could impact the company's lucrative ad revenue. Google loses Gmail trademark case in Germany Google can't use the Gmail name in Germany because doing so would infringe on someone else's trademark, a German court has ruled. Company: Microsoft's Windows campaign violates trademark G.ho.st, a startup that offers a hosted operating system, has accused Microsoft of violating a company trademark with its prominent use of the phrase "no walls" in its recently unveiled $300 million Windows marketing ... Dell loses bid for 'cloud computing' trademark Dell cannot register "cloud computing" as a trademark because the term is a generic one describing services offered by many companies, the U.S. Patent and Trademark Office (USPTO) has said in an initial ruling. Keeping the government's prying eyes at bay The Electronic Frontier Foundation (EFF) last week took the wraps off a new Web site that is designed to help you keep the government from taking the wraps off your personal communications and stored data. Rod Beckstrom resigns as director of National Cybersecurity Center Rod Beckstrom, director of the National Cybersecurity Center, resigns his position in a letter to Department of Homeland Security Secretary Janet Napolitano, complaining about the large role of the National Security Agency in the NCSC's efforts. Juniper introduces Adaptive Threat Management Juniper is this week introducing software that lets security platforms - even those made by other vendors - share and analyze log information in order to determine the root cause of network problems and fix them. The last word on federated provisioning...for now I'd thought we'd probably had the last word on federated provisioning, but a couple of old friends (and regular readers) had some more information which they've allowed me to share with you. Take the complexity out of firewall configuration changes As network security infrastructure grows larger and more complex, the likelihood of omissions and misconfigurations that can lead to data breaches and other serious problems is a growing concern. Tufin Technologies has solutions for security lifecycle management that take the human judgment factor out of firewall and router configuration changes. Read about the tools that reduce the risk level that's inherent in security configuration changes. Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment