JAMES BARKSDALE PRESIDENT & CEO NETSCAPE COMMUNICATIONS CORPORATION
BEFORE THE June 12, 1996 I. INTRODUCTION.
Good morning and thank you Mr. Chairman. My name is Jim Barksdale.
I am President and CEO of Netscape Communications Corporation
of Mountain View, California. It is a privilege to be a witness
today as the Senate begins deliberation of an issue which is critical
to the high-tech community in the United States. The subject
of encryption may strike some Members as an esoteric one. In
fact a lot depends on resolution of this issue -- whether America's
high-tech industry can effectively compete in the global marketplace,
whether the research, development and product design of America's
entrepreneurial geniuses will be stolen by foreign competitors
or governments, whether citizens of this country can continue
to enjoy the privacy they have come to expect, and whether that
worldwide network of networks, the Internet, will become not just
a town hall but a bustling electronic marketplace.
Netscape strongly supports the Pro-CODE legislation (S. 1726)
for the following reasons:
(2) The bill permits the high-wage U.S. software and computer
industries to compete on an equal plane with growing foreign competition
in the burgeoning world market for products with strong encryption.
(3) The bill aims at keeping U.S. products with strong encryption
from being sold to countries, individuals and entities that present
actual threats to national security, instead of assuming that
all foreigners must be prevented from obtaining these U.S. products.
(4) The bill focuses on who will receive U.S. export products
abroad, rather than the bit key length of the product, thereby
avoiding bit key length limits that ignore competitive threats
from strong encryption distributed by foreign suppliers.
(5) The bill rejects mandatory key escrow regimes that would
seriously undermine market opportunities for U.S. products abroad
because the overwhelming majority of countries that do not have
a mandatory key escrow system.
(6) The bill recognizes the reality and economic importance of
distributing software over the Internet by including Internet
distribution as a measure of whether a product is available on
the mass market.
Mr. Chairman, these hearings are particularly timely because
they follow release of the National Research Council's (NRC's)
study, Cryptography's Role in Securing the Information Society.
This report was authored by a broad range of experts, including
prominent members of the law enforcement and national security
communities. I am honored to appear before this Subcommittee
on the same day as Kenneth Dam, Chair of the Committee that developed
the report. While Netscape does not agree with everything in
the report, we do think that it sets out general principles that
provide an important basis for understanding the issues.
First, the NRC Report makes clear that encryption is necessary
to electronic commerce and that cryptography will be a fact of
life in the information economy, whether it is available from
U.S. companies or from foreign competitors.
Second, the Report emphasizes that encryption should be encouraged
because it plays an important role in protecting our national
security and in preventing computer crime and economic espionage,
while increasing confidence in communications networks.
Third, the Report cautions against imposing top-down government
solutions on this issue (such as mandatory key escrow) that are
not harmonized with market forces.
Fourth, the Report recommends that instead of trying to make
mass market encryption "go away," government should
adjust to a world in which encryption is readily available to
computer users by taking steps including upgrading its technical
abilities to decrypt information. Fifth, the Report supports an open debate on this issue, rather than one based largely on classified information. II. NETSCAPE & ENCRYPTION. Netscape was founded in 1994, but I am not new to the subject matter of today's hearing, having worked previously at McCaw Cellular, Federal Express, IBM, and with Naval intelligence during my military service. In fact, the very subject of encryption is not new. Encoding and decoding information has been part of American culture since the Revolutionary War, and most of us are aware that cracking the German Enigma machine significantly aided Allied efforts during World War II. But clearly there is a new world out there today. The Cold War is over, telecommunications structures throughout the world defy physical boundaries and allow new, life-improving products and services to be delivered to citizens in ways not imaginable ten years ago. There has been a sea change in the way we communicate.
New and exciting ways to use and transmit information have created
a huge demand for more secure communications available through
encryption. Netscape finds itself right in the middle of this
tornado of change. All of our products include encryption, as
privacy and security are fundamental building blocks of effective
communications. Selling software to the mass market on four-month
product cycles with thousands of beta testers located outside
the company all via the Internet is a new idea. It is being embraced
by established software concerns as a new model to follow. It
is totally different from the old idea of writing custom software
for a few big customers. Proprietary and stand alone systems
are becoming the past. Internet access and communications software
is the present. A computer connected to a network is in the immediate
future for every American. III. WHY THE CURRENT U.S. GOVERNMENT POLICY MUST CHANGE.
Current U.S. government policies on encryption are not working.
They hurt U.S. competitiveness, and they must be changed. A
clear understanding of market conditions in the world suggests
it is not a question of whether U.S. policies need to be changed;
the questions are when we will change them and whether we will
change them soon enough so that foreign entities and governments
do not replace Americans as the dominant players in the world
software and hardware markets. The time for action is now, not
next year or the year after. A. Export Controls Thwart U.S. Competitiveness People and businesses around the world want to communicate privately and securely. They want their medical records to be accessible when their needs require it, and they reasonably expect and want that information to be between them and their doctors. They want to send messages via electronic mail only to their intended recipients, and they want to buy boots or stocks electronically without fear of having their account information or credit card numbers intercepted and stolen. That is only reasonable. Today, unfortunately, U.S. export restrictions on encryption threaten this new environment. Export restrictions block American participation in this new marketplace, limiting not only Netscape and its American competitors, but also our customers. Netscape can sell 128 bit key length encrypted products in the U.S. and Canada. So can any other company or individual, foreign or domestic. But while foreign companies can compete with us in the U.S., our foreign competitors can sell their 128 bit encryption products abroad, and we can't. U.S. export laws only permit export of products of no more than 40 bit keys for all but a narrow category of products for financial transactions. For example, a large, corporate customer in Germany wanted to use Netscape's 128 bit key software to run a national health care information network. Each user would have a smart card carrying a chip containing their complete medical records and health care information in encrypted format. A patient could go from doctor, to employer, to government agency for treatment, benefits, and other assistance without having to keep track of paper, forms, and files. Because this network would have used encryption, the patient's information would have remained private. If the patient had to travel outside of Germany, the patient could transmit or retrieve information via this network because it is based on the open and interoperable standards of the Internet, which Netscape products support. Hence, if a patient had to come to a specialty hospital in the U.S., the records would be transmitted completely privately and with complete integrity. It is worth noting that telemedicine networks like this one are critical for U.S. citizens in rural areas if they are to get the same level of health care that citizens in urban areas enjoy.
Unfortunately for Netscape, because of U.S. export controls,
Germany will build its telemedicine network by having a German
company build the software from scratch. This not only means
a loss of a sale to Netscape. It also means that a new competitor
has been created where one did not exist before. As you can see
from this example, U.S. export controls not only cost American
firms sales, but end up aiding overseas competitors or even worse
causing new ones to be created. B. The Demand For Network Software With Strong Encryption Netscape has been all over the world selling product. And we have learned that our foreign customers do not want and will not buy our exportable 40 bit product. It has been hacked by college students in France and Berkeley, California. Foreign customers want to be on the same level playing field as U.S. based firms, meaning they want the same level of encryption strength that U.S. based firms use: 128 bit, or more. In addition, U.S. firms with officers, vendors and customers overseas want to have the same level of security across their entire network. They can't have their U.S. executives communicating in a secure manner using 128 bit encryption between two U.S. locations, then have to build a separate network to communicate between Billings, Montana, and Berlin, Germany, in which only vulnerable 40 bit encryption is used. Demand is growing rapidly for secure internal corporate networks, or "Intranets," which connect sites in different locations that are parts of the same enterprise. Also, the demand for company-to-company communications and transactions across "Inter-Enterprise Networks" is large and lucrative. Many U.S. firms buy supplies from overseas or vend their products and services to foreign customers. Transmitting payment information or product over the Internet is efficient and timely. However, without adequate levels of encryption, the risk of data loss or unauthorized access is too great for some to risk. Last, but perhaps most important for the consumer, is the need for encryption by businesses doing commerce online in the digital era. Consumers' faith in the GII will not blossom unless it is trustworthy. For now in the U.S., at least, consumers can use strong encryption. However, the need for security does not end at the physical borders of the U.S.
During the hearings on "Security in Cyberspace" held
on May 22 before the Senate Permanent Investigations Subcommittee,
it was reported that major banks and large corporations incurred
an estimated $800 million in losses last year due to unauthorized
access into and attacks upon their computer systems. (This figure
is the result of a survey conducted by the subcommittee.) Responsible
corporate customers that provide jobs to millions need strong
encryption to protect their computer networks and communications
channels here in America and abroad as they try to compete in
the global marketplace. C. Foreign Availability: Myth, Reality, & Customer Perception I realize this is a new subject for many Senators, so I want to say this again. We only want to be able to sell the same products in Europe or Asia that the rest of the world can sell in Europe, or Asia, or the U.S. Others can do it. We can't. Let's examine a few examples of who the others are. The most fundamental point to understand about foreign availability is that the U.S. does not have a monopoly on the world's cryptographers. Hundreds of people all over the world have the ability to create the mathematical algorithms that underlie encryption. Many are in Europe, the Middle East, Russia, China, and Japan. Cryptographers working in those nations can create the code to meet the demand that U.S. firms are denied from meeting. There are two examples of foreign competition that I would like to highlight. One is a very small company in a developing nation and the other is one of the largest companies in the world in one of the most developed countries. Thawte Consulting, Inc., of South Africa produces Internet software called Sioux based on the same open standards we use, and offers the same encryption strength as our domestic product -- 128 bits. As I've already described, U.S. export laws limit export of products with encryption to levels far weaker than this (i.e., 40 bits). Thawte Consulting targets corporate customers, the high end of the communications software market, selling server software, which yields the highest profits. Thawte Consulting distributes its Sioux software to the world via the Internet at extremely low cost. Also, because they distribute their product on the Internet, bugs in their product are fixed after being identified by beta testers -- the same type of interested users that help American companies improve their products.
Export controls have tied our hands, placing us at an often embarrassing
marketing disadvantage, enabling companies like Thawte Consulting
to establish a global market presence without effective competition
from American companies. As you can see from this enlargement
of the Sioux web site, Thawte even uses U.S. export control laws
as an explicit part of its marketing strategy, playing off concerns
about the inadequacy of U.S. export quality encryption, advertising
on the Web that:
Sioux offers full 128 bit encryption around the world, unencumbered
by US ITAR regulations . . . .
The U.S. ITAR regulations prohibit the export of strong encryption
technology from North America. This means that companies such
Netscape, Microsoft and Open Market have to ship "Export
Versions" of their software which have limited encryption
capability -- using 40 bit keys which can be trivially deciphered.
Since Sioux was developed outside of the ITAR framework it
ships with full encryption enabled all over the world. Why limit
your security? The threat from Sioux is in no way hypothetical. It functions as an add-on to Apache server software (an American-based free-ware product), which in the first quarter of this year, achieved greater market share than Netscape, Microsoft, Oracle and Open Market combined. The other example is a computer chip produced by Nippon Telephone and Telegraph (NTT) of Japan. This chip is based on a reproduction of American technology and possesses a public key strength of up to 1024 bits. NTT will sell this chip in the U.S. and elsewhere under the established brand name of RSA, a well known encryption technology firm just up the road in Silicon Valley from Netscape. Jim Bidzos, CEO of RSA, is here today as a witness so I will not go into any further detail on the example of NTT, since he is in a better position to explain the potential of NTT's encryption products. However, as several Senators have reminded us, encryption technology is not the first technology Japanese industry has reproduced with the intention of dominating the global marketplace. They are spending significant sums of money at the government level to leapfrog ahead of our technology in this area. They know how large the market can be. Just as they did with consumer electronics, cars and steel.
Finally, as an exporter, I stress that the existence of U.S.
export control bit key limits creates a serious customer perception
problem abroad. Customers are aware that U.S. export controls
block export of strong encryption. As you can see from the Sioux
web site, our foreign competitors are even beginning to advertise
on this basis. Until U.S. export control laws are relaxed, our
potential foreign customers will be suspicious of an important
feature of our product. D. The Threat To U.S. Companies Is Imminent
The damage export controls are doing to American competitiveness
and leadership in computer hardware and software is a clear and
present danger. Without immediate relief overseas, competitors
will gain substantial footholds in valuable and strategically
important markets in industrialized countries. Once these footholds
are established, foreign technical standards will drive the rules
of the marketplace. Success in the Internet industry depends
on driving the deployment and acceptance of technical standards.
The size of the company is not a determinative factor. Two years
ago no one really paid attention to Netscape, a small start-up
company. Today, established industry leaders have radically changed
their strategy to follow our lead even though we remain a small
company by comparison. Just as we have established an enviable
market position in a short time frame, others could supplant us
in a matter of a few months. Products don't have to be boxed
or shipped. People download products from the Internet immediately.
The product cycles in our markets are measured in a few short
months. If we continue to be prevented from meeting demand for
products with strong encryption capabilities, competitors will
do so at our peril. These competitors will set Internet standards
and sell their products here, making America dependent on their
technology. This in turn could seriously undermine America's
leadership in the many U.S. industries that are positioned to
be leaders in the electronic marketplace. We realize that congressional
"product cycles" are a lot longer than those for our
industry, and that years divisible by four are prone to gridlock.
We suggest, however, that this is a matter that cannot wait until
the 105th Congress assembles. IV. SHORTCOMINGS OF EXISTING U.S. POLICY.
The Administration has insisted that products incorporate key
escrow mechanisms that guarantee back door access for government
purposes as a condition of allowing export of products to non-banking
customers with more than 40 bit keys. The government began by
insisting that it holds all the keys, and has moved in a somewhat
positive direction, although in Netscape's opinion not far enough.
It is clear from the standards the government proposed for escrow
agents that the government is seeking the easiest possible access
for government agents to encryption keys. A. Mandatory Key Escrow Poses Serious Problems for U.S. Exporters
I have to point out that this government goal runs counter to
making U.S. product a success in international markets. Imagine
the reaction of a foreign customer if offered a product to which
the U.S. government has immediate, ex parte access. Just think
about it. If a Japanese company came to you with a terrific communications
product, but the Japanese government had ready access to the key
and could listen in at will, would you buy it? Our U.S. customers
wouldn't buy from a Japanese company either if the Japanese government
held the key. FBI Director Louis Freeh has made clear in public
testimony that there are dozens of countries and state-sponsored
economic espionage cells actively trying to get their hands on
corporate proprietary information. Given that threat, it would
seem the remedy would not be to have access to that information
controlled by governments. B. Mandatory Key Escrow Is An Untested And Cumbersome System I don't mean to minimize the interests of the law enforcement community. They have a tough job to do and they want to have every possible tool at their disposal to watch suspected criminals. I have enthusiastically cooperated with the law enforcement community at McCaw Cellular and at Federal Express. I know that wiretaps are useful tools for law enforcement. However, it does not follow that the equivalent of telephone wiretaps must be extended to data networks.
Remember that in 2 or 3 short years, there will be 100 million
people connected to each other over the Internet. Each of these
people is likely to use dozens, if not hundreds, of separate keys
in the course of a month of transmissions. Withdrawing and managing
these many keys securely will be a major and expensive management
problem. Furthermore, e-mail communications often don't travel
in one piece across the Internet. They are often divided into
separate "sub-packets" of information that at times
even travel along different routes to reach their destination.
The speed, volume and structure of electronic transmissions would
require a major increase in law enforcement staff in order to
carry out data network wiretaps. These two problems together
would result in the development of a massive new surveillance
bureaucracy to achieve a wiretap equivalent in this area. I suggest
very respectfully that there might be better ways for law enforcement
to root out crime. In addition, I do not believe that this country
can afford to build such a bureaucracy. C. Existing U.S. Policy Has Negative Effects on National Security In many policy discussions widespread use of strong cryptography is presented as a threat to law enforcement and national security interests. Perhaps the most important insight that comes from the NRC's report is its conclusion that cryptography is in fact one of the best protectors of our national security. The report explains that "export controls have a number of potentially negative effects on national security that policy makers must weigh against the positive effects of reducing the use of cryptography by hostile parties." (NRC Report, Cryptography's Role in Securing the Information Society, May 30, 1996, at 4-25.) We have often been told by the FBI that foreign governments have shifted much of their intelligence focus to the business sector. Hostile intelligence efforts to pry secrets from corporate America is a genuine national security threat. Fraud and computer-related crime also rank high among our law enforcement concerns. Wide deployment of strong cryptography would provide substantial and effective defenses against those hostile intelligence and criminal forces. Indeed if all commercial text and voice communications were encrypted, at least when they passed over publicly-accessible communications links, we would significantly reduce the risk of compromise of commercial and other information. It is important to note that the world of electronic communications changes rapidly and many technological factors other than encryption contribute to the difficulties confronting law enforcement and national security interests. According to the House Permanent Select Committee on Intelligence the ability of the NSA "to filter through the huge volumes of data and to extract the information from the layers of formatting, multiplexing, compression, and transmission protocols applied to each message is the biggest challenge of the future, [while] increasing amounts and sophistication of encryption add another layer of complexity." (Intelligence Community in the 21st Century, p. 121) Such a finding seems to indicate the need for further consideration of our nation's security needs in the digital era, separate from these proceedings.
If the present impasse between the policies proposed by law enforcement
and by industry continue, the GII will not be secure and will
be ripe for exploitation by malicious forces. The May 22nd hearing
before the Governmental Affairs Committee's Subcommittee on Investigations
revealed that government computer systems, including the Pentagon's,
have been repeatedly penetrated. Our power grid, gas and oil
pipelines, and stock exchanges are among potential civilian targets.
This is the exact opposite of the result intended by the present
export policy. So in my view, the core assumptions of export
controls on encryption are flawed. Marketplace solutions are
more attractive to consumers than having "big brother inside."
D. Existing Policy Is An Inefficient, Unsuccessful Attempt to Promote Mandatory Domestic Key Escrow Encryption In the case of law enforcement, the relevance of export controls is particularly problematic. The FBI and the various state agencies that use electronic surveillance are, in most cases, concerned with domestic, not foreign, activities. Thus, what is of most direct concern to them with regard to encryption is deployment of unbreakable encryption in the United States, not the export of encryption to foreign countries. Yet, the FBI and the Department of Justice have strongly supported the continuation of export controls. Indeed, the NRC report notes the candid admission of the FBI that "the use of export controls may well have slowed the speed, proliferation, and volume of encryption products sold in the U.S." (NRC Report at 4-13, n. 29) The Administration's May 20 "export and escrow" proposal seems to be a back door effort to affect the domestic use of encryption, not an effort to maintain NSA's capabilities with respect to international communications. If that is in truth what the Administration is seeking, one must wonder why they do not seek a more direct regulation of domestic use of encryption instead of the indirect, ineffective and counter-productive continuation of export controls. There have been no public proposals to limit encryption in the U.S. But if that's what the export control laws are covertly trying to accomplish, we ought to have an open debate on that subject. The existing policy distorts U.S. export control policy for domestic purposes. Although well-intentioned, the policy has not worked to bring mandatory key escrow to the domestic market, and is inflicting significant harm on U.S. manufacturers while jeopardizing U.S. leadership in Internet-related industries.
V. VOLUNTARY KEY ESCROW & KEY MANAGEMENT RULES ARE IN DEMAND. Netscape does not quarrel with the government's effort to encourage voluntary escrow in the U.S. by creating an escrow-friendly infrastructure with Federal purchases and the like. Reliable key management practices are important to ensuring that encryption systems do not result in lost data in the event that owner's key is destroyed or lost, for example, after the departure of an employee from a company. Management of keys is important to the trustworthiness of the infrastructure. However, available encryption must be strong enough to withstand attack over time; otherwise the infrastructure will be too fragile. U.S. policy must allow availability of strong encryption. I'll give you an example of why this is so important. With the rise of the Internet, product teams spread out over different locations in different countries and including different contractors and subcontractors often work on the same project over the Internet on inter-enterprise networks. Some of the information on these networks -- for example, airplane and automobile designs -- retains great value over time, making it worthwhile for foreign intelligence agents and corporate spies to devote significant time and computing power to cracking it. Furthermore, as explained in Moore's law -- that computing power doubles every eighteen months -- advances in computing power mean that information will be much easier to crack in only one or two years, when it still may retain substantial value. Export controls on key bit length up to an artificial limit (e.g., 56 bit) today fail to recognize that these and other customers want strong encryption that will withstand attack for a long period of time, outlasting improvements in code cracking technology. Self-escrow coupled with development of a free market in escrow services (e.g., a private sector and independent Certificate Authority Service Provider (CASP)) is the better solution. While encouraging development of a reliable key management infrastructure, the government should steer clear of mandating use of particular third party systems that would put vendors and software designers in the impossible position of forcing customers to use government-approved systems.
Where we disagree with the government is in its use of export
controls as a tool to affect what kind of encryption is sold domestically
by U.S. companies. Proposals to create a domestic mandatory key
escrow regime through export control incentives will not work,
as I explained earlier. But I want to stress, however, that we
want to work with the U.S. law enforcement community. And I think
the U.S. government would rather work with Netscape in Mountain
View, California, than with a Japanese manufacturer or some cryptographer
working out of his or her garage in South Africa. If export controls
are not lifted, U.S. law enforcement's task will be much more
difficult as it will be dealing with foreign companies that are
providing dominant security products and services. By winning
this battle, they might lose the war. VI. THE BENEFITS OF ENCRYPTION GREATLY OUTWEIGH ANY NEGATIVES. Strong encryption provides many benefits and solutions. For example, encryption in communications software provides an envelope for electronic mail. Unencrypted e-mail is not secure -- it is really an electronic postcard. The contents of the message are uncovered and visible for all to read. Encryption enables users to transmit private messages via the Internet in the same way that people mail letters and send packages through Federal Express and other delivery services. Because FedEx is able to provide its customers with a reliable, trustworthy, and secure delivery system worldwide, it enjoys a healthy share of the global market and as a result has driven standards and made its service readily available to most anyone, anywhere. Netscape's Internet software contains a browser to navigate the world wide web as well as e-mail. Integrating these two functions into a seamless package responds to customer demand for easier to use products and for convenience. In addition to its importance for e-mail, encryption is needed to secure online transactions. From protection of payment information such as a credit card or bank account information to personally identifiable information, such as a user's home and e-mail addresses, encryption facilitates electronic commerce. Without encryption, authenticating and guaranteeing the integrity of data transmitted from a customer to a merchant and back cannot be accomplished. Without encryption, consumers will not trust the Internet and the network will be vulnerable to computer crime. Also, individuals and businesses need to store information for safekeeping. In the physical world, safe deposit boxes, vaults, safes, and repository services, satisfy this demand. In the digital world, people need to have the tools to entrust this medium to transport and store their personal data and sensitive trade secrets. Encryption is essential for digital signatures and guarantees that the content of the communication has not been altered during transmission. Piracy of intellectual property is a serious problem in the global marketplace. However, if export controls were removed and strong encryption allowed, publishers of content on the Internet could protect their intellectual property by distributing it securely and marking it with encrypted information bound to the data.
Encryption can also help to protect consumer privacy, the subject
of hearings before the Federal Trade Commission only last week.
The FTC explored technological solutions to protect a computer
user's personally identifiable information from being collected
and used without his or her consent. A user of a public key certificate
service can go online using their digital i.d. as a privacy shield
without ever having to disclose other personal information..
Thus, encryption can protect children from unscrupulous marketers
and from online stalkers -- encryption can be the Internet latchkey.
VII. CONCLUSION. Widespread use of encryption depends on its being incorporated into mass market products and services. Entrepreneurs around the world recognize this fact, and we certainly understand that at Netscape. However, export controls prevent us from acting upon this fact. S. 1726 would solve the problem.
Mr. Chairman, we congratulate you and the other sponsors on the
introduction of S. 1726 and on these hearings, and look forward
to working with you, and all members of the committee on both
sides of the aisle toward its swift passage.
Jim Barksdale, 53, is President and Chief Executive Officer at Netscape Communications Corporation in Mountain View, California. In these positions he oversees all aspects of the growing Internet software company, whose goal is to provide open software to enable people and companies to exchange information and conduct commerce over the Internet and other global networks. Barksdale joined Netscape Communications in January 1995. He has served on the board of the company since October 1994. Previously, Barksdale served as CEO of AT&T Wireless Services since September 1994, following the merger of AT&T and McCaw Cellular Communications, Inc. In that position, he oversaw the daily operations of the business, guiding AT&T's efforts to maintain a leadership role in wireless communications. From January 1992 until the merger, he held the positions of President and Chief Operating Officer of McCaw, a company with revenues that exceeded $2 billion in 1993. Prior to McCaw, Barksdale spent twelve years with Federal Express Corporation of Memphis, Tennessee. From 1979 to 1983 he served as Chief Information Officer, overseeing the development and implementation of the company's world renowned customer service and package tracking systems. In 1983, he became Executive Vice President and Chief Operating Officer. After his appointment to that role, the company grew from $1 billion to $7.7 billion in revenues and expanded operations to 135 countries. Under his leadership, Federal Express also became the first service company to receive the Malcolm Baldridge National Quality Award. Barksdale serves on the boards of 3Com Corporation, @ Home, Harrah's Entertainment, and Netscape Communications.
For More Information Contact:
|