Search This Blog

Wednesday, March 21, 2012

Cisco helps users welcome BYOD

Do you know the new iPad? | Apple denies new iPad overheating concerns

Network World Daily News AM

Forward this to a Friend >>>


Cisco helps users welcome BYOD
Cisco is taking this BYOD thing seriously. The company this week unveiled new and enhanced products designed to specifically manage yet optimize a workplace for employees plugging in their own personal devices. Read More


RESOURCE COMPLIMENTS OF: Xirrus

Wireless is taking over the enterprise
The evolution of Wi-Fi continues, delivering increased performance, security, & reliability for the modern workforce. To better understand the pressures being placed on wireless networks due to the explosion of mobile devices & applications, Xirrus commissioned a report to examine "the future of Wi-Fi in the enterprise" by GigaOM Pro, download now. Click to continue

WEBCAST: Motorola Mobility

Authentication, Certificates and VPNs
MOTODEV for Enterprise can help get you up to speed quickly on key topics such as how to enable secure access to a company intranet from outside the firewall. This webinar provides a clear explanation of terms and technologies and what they can do for your enterprise app development. View Now

Do you know the new iPad?
Few things have been more anticipated than the new iPad announced March 7 and that became available March 16, with speculation running wild about what the upgraded tablet would include among its new features. While plenty is new and innovative, that doesn't include the name – new iPad – which shows a distinct minimalist bent on the part of Apple marketers. Test yourself on the new iPad essentials here with a brief quiz about the latest must-have tech device. Keep score and rate yourself at the end. Read More

Apple denies new iPad overheating concerns
Apple on Tuesday denied any overheating concerns on the new iPad, saying that the product operates well within its thermal specifications. Read More

LulzSec is back; Anonymous targets Imperva
Hacker collective LulzSec, six of whose members were arrested earlier this month, will resume active operation April 1, according to a video posted on YouTube. Read More

Ads in mobile apps aren't just annoying -- they're risky, too
Many mobile apps include ads that can threaten users' privacy and network security, according to North Carolina State University researchers. The National Science Foundation-funded researchers studied 100,000 apps in Google Play (formerly Android Market) and found that more than half contained ad libraries, nearly 300 of which were enabled to grab code from remote servers that could give malware and hackers a way into your smartphone or tablet. Read More


WEBCAST: Mitel

Real World Perspectives from Real World Practitioners
Join your peers as they discuss Unified Communications and their move to voice virtualization—the business drivers behind their decisions, the benefits they've received and the best practices they've learned along the way. It's a must-see event for joining voice and data on a single virtualized infrastructure. Learn More

Cisco offers virtualized video surveillance
Cisco today announced a virtualized version of its Video Surveillance software for use on its Unified Computing System platform for enterprise- or government-operated video-camera deployments. Read More

DARPA wants the ultimate technology, sensor network to monitor the vast Arctic
Talk about an ambitious project. The scientists at the Defense Advanced Research Projects Agency said today they want to develop a massive system of sensors and unmanned systems that can monitor and track the remote environment of the Arctic. Read More

Asking employees for Facebook credentials is an invasion of privacy
Earlier today, I stumbled across a troubling article in the WSJ which highlighted the growing trend of employers asking potential employees for their Facebook login credentials. That's right, a standard background check is no longer sufficient as some employers are eager to hop onto a user's Facebook account to see what they're all about and snoop around for dirt. Read More

Doing the security-card butt-bump
We've just been handed new security cards for access to our office and when rummaging through my wallet to return the old one I realized that I didn't even remember what it looks like. Reason is that I've never had to take it out to gain entry. Instead, I would always do one of two things: Waive my wallet at the sensor. Or do the security-card butt-bump. You say you're unfamiliar with this butt-bump?... Read More


WHITE PAPER: Antenna

Mobile strategy—what are 1,000 businesses planning for 2012
The Mobile Business Forecast 2012 surveyed 1,000 global businesses on their current/future plans for mobile. The report offers insight into how companies are using mobile to address the needs of consumers and their own employees. In addition, find tips on how to avoid chaos in the rush to mobilize. Learn More

Windows 8 is looking forward to Christmas
A Bloomberg report built around anonymous sources offers a few details about the Windows 8 launch: Timeline: An April Microsoft event to fill in partners on its launch plans, complete work this summer, launch in October, stock stores for Christmas sales Available at launch: Three ARM tablets, more than 40 X86 devices. Read More

HP to combine PC and printer divisions, report says
Hewlett-Packard Co. is to combine its PC and printer divisions into a single business unit, a move that will see Vyomesh "VJ" Joshi, the longtime head of HP's printer division, leave the company, according to a report published Tuesday. Read More

Cisco's big comeback
Just a year ago, Cisco's stock was taking a beating after the sales failed to meet Wall Street expectations.The company wasn't exactly reeling, but CEO John Chambers knew something had to be done to right the ship. Read More

Why You Need Automated Server Access Controls
If your organizations has not implemented automated server access controls, you're exposing your business to risks ranging from compliance issues to insider fraud, corporate espionage and even nation-state sponsored attacks. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. FAA 'exploring' use of devices like iPad during flights
  2. Stolen encryption key the source of compromised certificate problem, Symantec says
  3. Which smartphone apps are the biggest data hogs?
  4. New iPad sales already top 3 million
  5. 'Surprise' Mac app quickly configures iOS devices
  6. Cisco incubating software-defined network startup?
  7. Don't wait on this patch, Microsoft says
  8. Secret Service takes out "astonishing" cyber theft ring
  9. How much traffic does streaming video streaming generate?
  10. Cell-to-Wi-Fi roaming is on the way, but may come with a price

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: