Monday, April 27, 2009

How Bluetooth got as fast as Wi-Fi; Report: Apple, Verizon in iPhone talks; Google Flu Trends?

Google Flu Trends not much of a heads-up; Verizon leapfrogs AT&T for wireless subscriber lead; Comparing costs of WLAN intrusion prevention systems
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Security and regulatory compliance are not optional despite slashed IT budgets. Tune into this Webcast sponsored by Oracle to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Learn more.

rule

Spotlight Story
How Bluetooth got as fast as Wi-Fi

John Cox By John Cox
Kevin Hayes, technical editor for the core of the new Bluetooth-over-Wi-Fi spec, dives into some details on how it was done, how it works, and what it means. Read full story

Related News:

News podcast: Network World 360
Conficker developments; New York's anti-phishing effort.

Report: Apple, Verizon in iPhone talks
Apple is in discussions with Verizon to create a version of the iPhone that would run on Verizon's cellular network, according to a report in USA Today.

Google Flu Trends not much of a heads-up
When Google unveiled Flu Trends, the hope was that by tracking search data about the flu, the tool would give public health officials a kind of early warning system for an impending flu epidemic. Unfortunately, it doesn't seem to work all that well, at least for potential pandemics that start outside the U.S., say in Mexico City.

Verizon leapfrogs AT&T for wireless subscriber lead
Completing the Alltel acquisition has helped Verizon jump ahead of AT&T to give the carrier the most wireless subscribers in the United States.

Comparing costs of WLAN intrusion prevention systemsCox: How do wireless intrusion prevention systems compare in terms of cost? NW's Wireless Alert Newsletter editor, Joanie Wexler, made some assumptions and did some calculations to give some guidance.

Information Overload? Turn Off! Tune Out!Mathias: Well, this one is a little hard to believe, at first glance, anyway, but some of the iPod/iPhone generation, in a reaction to information overload, have had enough and are turning off their gadgets - or so reports the Boston Globe (soon itself, perhaps, to become a victim of the rapidly-changing sands of the information delivery landscape).

RSA 2009 Best of Show
Stiennon: As much of the security industry recovers from RSA Conference 2009 in San Francisco it is time to attempt to condense a five day conference to few hundred words.

Today on Google Subnet
Ten ways Google is like God: An SEO perspective; The real scoop on the first Android netbook; Google Earth helps find missing plane; and Google Blogoscoped checks out Google’s new social news gadget.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Oracle
rule

The Cost of Securing your Database
Security and regulatory compliance are not optional despite slashed IT budgets. Tune into this Webcast sponsored by Oracle to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Learn more.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/27/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Seven burning security questions
  3. The downfall of Sun
  4. The legal risks of ethical hacking
  5. Conficker.E to self-destruct on May 5th?
  6. Researchers show how to take control of Windows 7
  7. Einstein systems to inspect U.S. government's Internet traffic
  8. The evolution of Ethernet
  9. The biggest losers in the Oracle, Sun deal
  10. Intel CPU cache poisoning: dangerously easy on Linux
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment