Search This Blog

Monday, May 26, 2014

9 great iPad tools for IT pros

New iOS app secures IM traffic with 'post quantum' encryption scheme | Coming soon to a fridge near you -- targeted ads

Network World Mobile & Wireless

Forward this to a Friend >>>


9 great iPad tools for IT pros
Private servers, WiFi camera monitors, remote management -- further proof that the iPad is an IT pro essential Read More


RESOURCE COMPLIMENTS OF: Network World Tech Tours

Network World Announces a New Seminar
Wireless Infrastructure: Optimizing Performance for the Modern Network. July 17, Westin Chicago River North. Free seminar. Learn more and register now.

WEBCAST: Xirrus

Isn't it time to take a fresh look to Wi-Fi scalability?
Date: Thursday, June 26, 2014, 2:00 PM EDT It isn't news that wireless networks are being pushed to the limits every day and IT organizations are under duress to deliver a reliable wireless network to meet the demands of users. Learn more!

New iOS app secures IM traffic with 'post quantum' encryption scheme
A new instant messaging application for the iPhone uses an advanced, "post quantum" encryption scheme to scramble one-on-one chats. It's intended as a bullet-proof secure alternative to WhatsApp's addictive message interface and to mobile carrier's primitive and (outside the U.S.) pricey SMS texting services. Read More

Coming soon to a fridge near you -- targeted ads
Targeted advertisements are headed to smart fridges, smart thermostats and other Internet-connected devices, raising potentially new privacy issues for consumers who use those products. Read More

Google Apps adds new tools for managing Android phones
Google Apps got a mobility upgrade on Wednesday, as the company added four new features to its MDM toolkit for Android smartphones. Read More


WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

12 most powerful Internet of Things companies
Billions of connected devices means billions in revenue for these companies. Read More

At Indy 500, Verizon races to offer premium video content on mobile devices
During this Sunday's Indy 500, Verizon Wireless, Ericsson and other tech companies will be focused less on the drivers and more on a racetrack demonstration of new wireless technology called LTE Multicast that would used for transmitting video to smartphones and tablets. Read More

U.S. government issues massive recall notice on buggy Nest alarms
The Consumer Product Safety Commission today issued a complete recall of all Nest Protect Smoke + CO alarm systems, over an issue that could silence the devices at a critical time. Read More


WEBCAST: IBM

Reinventing Storage Efficiency!
Live event: Tuesday, June 17, 2014 1 PM ET / 12 PM CT / 10 AM PT What if you could reduce your storage costs by half? Attend this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage using Flash Storage, and to learn how IBM is accelerating storage efficiency. Register Now

BlackBerry to take on IoT headaches with Project Ion
BlackBerry says it can take back-end software development off the to-do lists of enterprises that want to take advantage of the Internet of Things. Read More

BYOD Widening Employee-Employer Trust Gap, Survey Finds
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure. Read More

How far are you willing to go to spy on your employees' smartphones?
The ultimate eavesdropping solution for people who want to see what their employees, kids or spouse are doing on their Android (or jailbroken iPhone) smartphone. Read More

Tech's top-paid CEOs
Fifteen tech leaders made more than $14 million in 2013. Read More


SLIDESHOWS

Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 12 most powerful Internet of Things companies

2. Cisco to acquire malware prevention company

3. TCO of Cisco ACI 3X better than VMware NSX

4. Linux: Best desktop distros for newbies

5. Tech's top-paid CEOs

6. 20 cool things you can do with a Raspberry Pi

7. New Internet Explorer zero-day details released after Microsoft fails to patch

8. IT pro gets prison time for sabotaging ex-employer's system

9. FIRST LOOK: Microsoft Surface Pro 3 tablet/PC

10. Rackspace not a good fit for Cisco, says Chambers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: