Search This Blog

Monday, January 24, 2011

Cisco beefs up WiFi security; RIM's BlackBerry agenda for the enterprise

RIM's BlackBerry agenda: SharePoint and deeper enterprise integration | Apple reveals most downloaded iPhone, iPad apps of all time

Network World Wireless

Forward this to a Friend >>>


Cisco beefs up WIPS capabilities
Cisco has enhanced its Adaptive Wireless Intrusion Prevention System (wIPS) so that its Wi-Fi access points can both forward traffic and scan for security anomalies. The company contends that the move should make it more affordable for enterprises to add the wireless intrusion prevention capabilities required to better protect their airwaves. Read More


WHITE PAPER: F5 Networks

F5 and Infoblox DNS Integrated Architecture
As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market respectively, F5 and Infoblox have teamed up to provide customers with a complete DNS solution. Read now!

In this Issue


WEBCAST: Red Hat

5-Step RISC Migration Planning Process
In this session, HP and Red Hat speakers will explain how to prepare for and execute an effective migration from SPARC/Solaris OS-based systems to Red Hat Enterprise Linux on HP ProLiant and BladeSystem servers. View Now!

RIM's BlackBerry agenda: SharePoint and deeper enterprise integration
Company lays out technology road map for 2011 that banks on enterprises seeking enhanced integration with core systems and traditional controls Read More

Apple reveals most downloaded iPhone, iPad apps of all time
Apple has added a page to its iTunes Store that reveals the top iPhone and iPad app downloads since the App Store opened in mid-2008. Read More

Cisco beefs up Wi-Fi mobile payment security
Cisco is beefing up wireless transaction security with new software features for its Wi-Fi access points. The vendor says the changes add needed protection over and above that mandated by the Payment Card Industry (PCI) standard. Read More

Mobile device makers react differently to attack info, researcher says
When a researcher at an ethical-hacking firm discovered mobile devices from Apple, Google, RIM and HTC had a flaw in them that would allow an attacker using malicious Web code to freeze them up and crash them, he contacted the companies last year. Read More

Google's goals this year are all mobile, CEO says
All of Google's strategic initiatives this year are about mobile, the company's CEO, Eric Schmidt, wrote in a guest article for the Harvard Business Review titled "Preparing for the Big Mobile Revolution." Read More


WEBCAST: Wildpackets

10G Analysis & Troubleshooting without Compromise
You need to analyze and troubleshoot 10 Gig network traffic without suffering dropped packets or having to slice, filter and dissect your network segments. Learn how with a TimeLine appliance you can have real-time network performance, including VoIP statistics, while capturing all packets to disk. View Now

7 high-profile executives who left Microsoft
Server and Tools President Bob Muglia is on his way out. Who else has left Microsoft in the past year or so? Read More

Technology's Biggest Myths
Expensive cables are better! Defragging speeds up your PC! We put these and other claims to the test to find the truth behind tech's tallest tales. Read More

Sony Ericsson sues Clearwire over logo
Amid intense competition among handset vendors, carriers and software providers in the fast-growing mobile market, a new battle is brewing between two green swirls. Read More

iPad leads way as 'media tablet' business grows 45% in Q3 2010
Apple's iPad tablet helped the new 'media tablet' business grow by 45% in the third 2010 quarter; emerging Android devices will help sales double in 2011, IDC says. Read More

With rate increase, Sprint bows to 4G consumption reality
While Sprint isn't willing to give away its unlimited data plans, the carrier must also make concessions to reality. Read More


WHITE PAPER: Tripwire

3 Critical Layers to Compliance Automation
Organizations that automate compliance processes have better audit outcomes and realize an average increase in profits of 6.4%. Learn how built-in role-based workflows take error-prone, mundane tasks out of the compliance equation and allow for automatic remediation of non-compliant configurations. Read More!

Then and Now: How Technology Has Changed Our Lives
Advances in technology have fundamentally changed these 11 aspects of everyday existence. Read More

2 Wi-Fi vendors adding cloud-based networking
Two Wi-Fi vendors are adding routers, coupled with cloud-based network management to create subscription networking services, both wired and wireless. Read More

Broadband: How will faster wireless affect wireline?
Several announcements in the last month got us to thinking about what effect faster wireless broadband speeds will have on wireline broadband. For example, could 4G/LTE broadband wireless substitute for wireline broadband access to the extent that wireless voice has replaced wired phone lines? Could 4G/LTE wireless broadband supplement wireline in cases of disaster recovery or in remote areas in lieu of a satellite broadband connection? Of will 4G/LTE hasten the move of cloud-based applications to mobile devices? Read More

Starbucks extends mobile payments to 7,500 stores
Starbucks Wednesday began offering mobile payment systems at 7,500 of its coffee shops. Read More

AT&T and Sprint, How Stupid Do You Think We Are?
Great news! Starting Jan. 23, AT&T will reportedly funnel all of its new subscribers into a $10 per month, 1,000-text message plan. Read More

FCC urged to approve body area network plan
Representatives of the Aerospace & Flight Test Radio Coordinating Council, Philips Healthcare and GE Healthcare met with the FCC to strongly urge timely adoption of a frequency band for medical body area networks. Read More

Panic time quiz: How prepared are you for IPv6?
Probing questions in light of IPv4 addresses running out Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. The case of Apple's mystery screw
  2. Is Apple expanding use of tamper-resistant screw for iPhone?
  3. Gartner slams Cisco's single-vendor network vision
  4. 12 geekiest snow and ice sculptures
  5. Yahoo IPv6 upgrade could shut out 1 million Internet users
  6. Fake GSM base station trick targets iPhones
  7. Google's management shakeup: The day after
  8. Gamers hijacked your server? Might be an inside job
  9. Cause of Windows Phone 7 data spikes found
  10. Is retaliation the answer to cyber attacks?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: