Marriott International - News, Features, and Slideshows
Rick Hampton, the wireless communications manager for Boston-based Partners Healthcare, has seen the dialogue among network professionals heating up in the wake of the FCC's sternly-worded enforcement warning about illegal Wi-Fi blocking and says it's no wonder the commission is fired up.
By Bob Brown | 10 February, 2015 22:21
The FCC has been very clear that it didn't approve of a Marriott International hotel's blocking of convention center attendees' Wi-Fi hotspots: It fined the hospitality company $600,000 last fall and issued a stern warning on Jan. 27 that such wireless network interference by others will not be tolerated either.
By Bob Brown | 04 February, 2015 05:05
The FCC's sternly worded warning about illegal Wi-Fi blocking earlier this week got through to at least one organization: Marriott International's Global CIO issued a statement Friday that the hospitality outfit is withdrawing efforts to gain clarification from the commission on what methods can be used to protect corporate Wi-Fi networks.
By Bob Brown | 01 February, 2015 09:58
The FCC on Tuesday warned that it will no longer tolerate hotels, convention centers or others intentionally interfering with personal Wi-Fi hotspots.
By Bob Brown | 28 January, 2015 09:24
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
- At Google I/O, no huge surprises but a honing of critical products
- The NSA reportedly tried -- but failed -- to use a Stuxnet variant against North Korea
- Google to Cardboard developers: Keep it short and simple, and watch out for nausea
- Italy's architectural elite moves to rub out crowdsourcing design site
- Apple's tech support thrashes competition, whether in-store or over the phone
- New iOS tools help Android developers -- and Google
- Ericcson touts 5G mobile speeds
- Silk Road mastermind Ulbricht sentenced
- Google I/O 2015 in photos
- Intel works to end "lost" data center devices
- Microsoft throws open the doors for Cloud Foundry on Azure
- Don't blame free Windows 10 for PC business ills
- Google and Levi's team up on smart clothes
- Google bets that smart fabrics, gesture interfaces will replace fiddling on a tiny wearable touchscreen
- New NSA phone dragnet proposals blasted as flawed