Search This Blog

Monday, December 19, 2011

3 tips for avoiding tablet management headaches

Timeline: RIM's very bad year | Best and worst celebrity technology moments of 2011

Network World Wireless

Forward this to a Friend >>>


3 tips for avoiding tablet management headaches
Tablets are a tricky proposition for many IT departments since they have many of the content creation capabilities of laptops but lack mature security software. Read More


RESOURCE COMPLIMENTS OF: Fluke Networks

Overlay vs. Integrated Wireless Security
Look at the pros and cons of different approaches to wireless intrusion prevention systems (WIPS). There are a few different ways to deploy monitoring systems that scan the airwaves for unauthorized devices and intrusion attempts. Each approach has its merits. It's up to the enterprise IT department to understand the tradeoffs. Click to continue

WHITE PAPER: AMD

Make Virtual Desktops a Valuable Reality with AMD
This paper will explore how the fast-emerging trend of "desktop virtualization" is giving IT managers a potent solution for tackling the problems associated with PC sprawl. Read More!

Timeline: RIM's very bad year
You get the feeling that executives in Research in Motion will especially relish singing "Should old acquaintance be forgot" this year. Read More

Best and worst celebrity technology moments of 2011
Scarlett Johansson, Justin Bieber, Charlie Sheen, Lady Gaga and Alec Baldwin all make tech news, voluntarily or not Read More

Intel reorganizes mobile business to speed and improve development
In a reorganization of its mobile business, Intel said Wednesday it has formed a new group, called the Mobile and Communications Group (MCG) that will focus on phones, tablets, and other mobile devices. Read More


WHITE PAPER: Akamai Technologies, Inc.

A New Look at Payment Security
Akamai Edge Tokenization takes much of the cost and complexity out of eCommerce. By tokenizing critical payment data before it reaches your PCI-regulated infrastructure, Akamai relieves your organization from what experts consider the most important and challenging PCI requirement. Read more

Road warrior roadkill: 2011's mobile technology losers
Spectacular flameouts and products that simply ran out of gas litter the road to the mobile future we're all traveling Read More

The best of Network World's Gift Guide 2011
Network World's own Indiana Shaw goes through more than just the temple of doom to find gifts suitable for you or other techies on your list. Just like his more famous archeologist cousin who digs up ancient artifacts and treasures from around the globe, Indiana Shaw scours the globe and the Internet to dig up the greatest technology treasures. Read More

RIM delays new phone launch, takes a hit on tablets
Research In Motion said it won't start selling phones with its new software platform until the "later part" of 2012 and had to take a US$485 million inventory-related charge on its PlayBook tablet as part of another poor earnings report for the struggling smartphone maker. Read More


WHITE PAPER: Raritan

Why Managing VMs is So Complex
Because virtual servers coexist with nonvirtualized ones, it effectively doubles the tools and efforts relevant to data center administration. Discover how a unified, out-of-band approach that aggregates management tools into a single, consolidated platform, renders the virtual and physical layers transparent from an IT management perspective. Read now!

Microsoft dissecting Windows Phone messaging bug
Microsoft Windows Phone engineers are reviewing a report that various messaging technologies can be used to send the phone into a reboot and then freeze its messaging center, or hub. Read More

Android users embrace Facebook, Google apps
Google must be pleased to know that Android users aged 18-44 tend to keep their apps all in the family – the Google family, that is. Read More

FCC doles out $100K to open source community apps challenge winners
The $100,000 challenge: Develop useful, localized open source apps that make local public information more personalized and usable. Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Why Eric Schmidt's prediction about Android vs. iOS development is wrong
  2. LAN-party house guy spills important cost details
  3. 30 events that shaped Cisco in 2011
  4. Microsoft to start automatic updates of IE without asking users
  5. Apple in 2012: 5 reasons it will be a tough year
  6. 3 tips for avoiding tablet management headaches
  7. Ubiquitous surveillance from Big Brother's wayback machine
  8. iBahn, supplier of hotel Internet services, denies breach
  9. 8 free Wi-Fi security tools
  10. Googler's LAN-party house sparks awe and envy

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: