Search This Blog

Wednesday, October 08, 2014

'Unlawful’ WiFi hotspot blocking ruling highlights academic IT headaches

New products of the week 10.06.14 | 12 tips to tune your Wi-Fi network

Network World Mobile & Wireless

'Unlawful' WiFi hotspot blocking ruling highlights academic IT headaches
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots – the sort that provide wireless data access from the same -- it's not the best of times. Read More


WHITE PAPER: Open Text

Global Growing Pains: Tapping into B2B Integration Services
A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities they're seeking in B2B integration partners. Learn More

WEBCAST: Enterprise Management Associates

Best Practices for Automation and Limiting Risk
Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Learn More

New products of the week 10.06.14
Our roundup of intriguing new products from companies such as IBM and HP Read More

INSIDER
12 tips to tune your Wi-Fi network
More and more people are looking for Wi-Fi connectivity, especially at public venues -- on their laptops, smartphones and tablets -- to help conserve cellular data usage. Read More

Three theories why iOS 8 adoption is slow on the uptake
Unlike previous versions of iOS, people are holding off on upgrading to iOS 8. Read More


WEBCAST: Ping Identity

BYOD – It's Not about the Device
BYOD creates issues with protecting business applications and data. It is hard to protect these devices with the traditional model of IAM. Explore how modern identity protocols like OAuth & OpenID Connect enables this separation, protecting both the employee's privacy and the enterprise's data. Learn More>>

McAfee's most dangerous cyber celebrities of 2014
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware Read More

Apple sapphire supplier files for Chapter 11
GT Advanced Technologies, the company that Apple struck a $578 million deal with last year for ultra-hard sapphire material, filed for Chapter 11 today in a federal court. Read More

Elliptic Labs smartphone is controlled by waving at it
Ultrasonic speakers can turn phones into gestural interfaces Read More


WHITE PAPER: Citrix Systems

Understanding Liquid Computing and Handoff
The greater the number computing devices we use, the more the center of our computing life shifts to the cloud. The last thing anyone wants is for data and preferences to be locked in a smartphone, tablet, or desktop. Learn More

15 GOTO schools for the best programming jobs
LinkedIn data reveals which schools have the most graduates working as software developers for the most desirable employers Read More

iPhone 6 Plus accounts for about 20% of new iPhones
Although Apple's iPhone 6 Plus remains in short supply, its portion of total iPhone 6 and 6 Plus sales has increased over the last two weeks, according to analysis of usage-tracking data. Read More

Samsung paid Microsoft $1 billion last year to build Android phones
Microsoft says Samsung is trying to avoid its future payments Read More

10 creepy mobile apps that make spying easier
Read More


SLIDESHOWS

9 useful add-ons for Google Docs

Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Microsoft reveals biggest-ever change in Windows

2. Why did Microsoft skip Windows 9 and jump to Windows 10?

3. Secret ad beacon network uncovered, shut down in New York City

4. 9 useful add-ons for Google Docs

5. McAfee's most dangerous cyber celebrities of 2014

6. VMware's Casado talks about evolving SDN use cases, including a prominent role for security

7. Gartner: Top 10 strategic predictions for businesses to watch out for

8. Marriott must pay $600,000 for blocking personal Wi-Fi hotspot

9. The 10 worst people you meet working in IT

10. Why Google hiring 200 security guards is a big deal


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: