Monday, August 06, 2007

802.11n WLAN tests show 'unbelievable' results; Rating Philadelphia's citywide wireless net

Network World

Daily News: PM




Network World Daily News: PM, 08/06/07

802.11n wireless LAN tests show 'unbelievable' results at state college
The IT staff at Morrisville State College, where the first large-scale Draft 802.11n wireless LAN is being designed, says the prototype gear exceeds expectations.

The Philadelphia experiment
Philadelphia is turning itself into one of the world's largest Wi-Fi hot spots. We report on how it's going - and ask Network World readers in Philadelphia to try out the Wi-Fi and then post their findings (which we'll also be mapping)..

Community talk

Manage Skyrocketing Storage

The data on your network is growing at a rapid pace that's only going to increase. Download Network World's latest Executive Guide and get the practical, real-world advice and insider information you need to best manage and meet your storage demands and industry regulations.

Click here to download.

New bloggers: Say hello to Michael Noel, who will be writing about SharePoint Server 2007, and Colin Spence, who will also be writing about SharePoint.

Jamey Heary explains the top nine things any NAC solution must do (and do well). Michael Morris explains Cisco's upcoming CCDE and Architect certifications. Ken Presti urges Cisco partners not to oversell Telepresence. Brad Reese looks at Cisco unified border element CUBEs.

Rand Morimoto reports from the Imagine Cup - an IT competition in Seoul. Greg Royal wonders if VoIP bundling is the future. John Obeto looks at the decision by Massachusetts to add Microsoft's Office Open XML to its list of approved document standards. Tyson Kopczynski offers a detailed overview of Certificate Lifecycle Manager.

Deb Radcliff urges you to devote more attention to application security. Linda Musthaler considers the possibility the Wall Street Journal is run by idiots who don't understand IT. Joshua Levitt discusses technology recycling and reuse. Jason Meserve discusses Flickr's move to video.

Keith Shaw discusses some bad UI design - on Coke bottle caps. Paul McNamara considers the outing of Fake Steve Jobs. Adam Gaffin discovers the meaning of "true QAM." Beth Schultz posts presentations from the upcoming Next Generation Data Center Conference & Expo.

Users consider Nortel's win of a large VoIP contract, and wonder if that NBC reporter outed at DefCon was really a decoy. Kumar Amit seeks help on figuring out if his Exchange server is sending out spam. Stephen Sprague writes vendors are beginning to come out with ways to really wipe disks clean.

In depth

Zero-day exploits: Consider the OS
Attackers wielding zero-day exploits are one of the most significant threats facing enterprise networks today. While plenty of vendors promote zero-day protection mechanisms, if they don't address the entire operating system, they leave the door open for attack.

More news

EBay's computing guru gives behind-the-scenes peek
EBay computing guru discusses the online auction company's take on data center, virtualization technologies.

Security expert takes aim at leaky C software programs
University of Illinois at Chicago researchers are taking aim at leaky software programs -- from Web browsers to e-mail applications --written in C.

Questions swirl around virtual-machine rootkit detection
Debate intensifies at Black Hat conference over detection of virtual-machine rootkits; Vista security questioned.

Regulatory-compliance demands put IT on the spot
Meeting the goal of regulatory compliance means running a tight security ship. When auditors come calling, however, how can you prove that you do? Security managers share their tips on how high tech and plain old communication skills can make the difference between passing and failing.

Fighting back against software-agent overload
Network management and IT security customers and vendors are addressing the issue of software-agent overload.

12 issues you need to know about software-as-a-service
A look beyond the hype of software-as-a-service. Customers need to consider data security, support models, SOA, integration and whether an application is mission-critical.

TODAY'S MOST-READ STORIES:

1.Undercover TV producer booted from DefCon
2. Do Not Call Registry gets wake-up call
3. NAC alternatives hit the mark
4. Newspaper outs ‘Fake Steve Jobs’
5. Cisco founder unveils the Next Big Thing?
6. Tech-support poser gets sensitive info from IRS
7. Cisco founder brings optics to the router guys
8. The case of the great hot-site swap
9. IBM saves $250M with Linux-run mainframes
10. Researchers flag VoIP exploits at Black Hat

MOST E-MAILED STORY:
Hogwarts IT director quits


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment