Tuesday, September 08, 2009

iDEN PTT now works on Moto WLAN; iPhone passcode bugs revealed

iPhone passcode bugs revealed; Sprint readies its first Android smartphone
Network World logo

Wireless Alert

NetworkWorld.com | Update Your Profile


Sponsored by Sophos
rule

Security Solutions
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.

Visit this site today!

rule

Spotlight Story
iDEN PTT now works on Moto WLAN

It's widely known that walkie-talkie users tend to favor the industry's initial push-to-talk (PTT) technology, which Motorola developed for its iDEN network, for its speed advantages. I just recently learned that the company has added iDEN PTT to its suite of Wi-Fi enterprise mobility services. iDEN, of course, is best known as a service operated by Sprint Nextel in the U.S. Read full story

Related News:

iPhone passcode bugs revealed
It has already been proven that the passcode on an iPhone can be removed. The purpose of this article is to point out the false sense of security delivered through Apple's marketing of iPhone features for the enterprise. My testing has revealed that the enterprise security features do not behave correctly and I will point out three flaws with how passwords are handled with the iPhone and EAS.

Sprint readies its first Android smartphone
Sprint will release its first-ever handset featuring the Google-developed open-source Android operating system next month.

Smartphones: A Tower of Babel for developers
In the fast-moving world of smartphones, application developers must make choices: Develop native applications for Apple's iPhone or perhaps for the Palm Pre. Or maybe build for Symbian, the RIM BlackBerry, or Google's Android. If you have the time and skills, you can build your application again and again for different phones, using native development resources.

AT&T opens device certification lab
AT&T opened up a wireless device certification lab to help put developers and manufacturers on a fast track to getting their devices running on AT&T's network.

Group asks IRS to repeal tax of personal mobile-phone use
A little understood 20-year-old U.S. Internal Revenue Service rule that taxes employees' personal use of employer-provided mobile phones should be repealed, trade group CTIA said.

ACLU lawsuit says student's cell phone was illegally searched
A middle school honor student who was expelled after authorities searched his cell phone and found evidence of what they claimed were "gang-related activities" now has a lawyer: the American Civil Liberties Union.

iPhone app tracks swine flu, other disease outbreaks
A free iPhone app called "Outbreaks Near Me" is designed to help users track and report oubreaks of swine flu and other infectious diseases.

Microsoft Embraces Windows Mobile 6.5's Blandness
While it seems like everyone's trying to duplicate the iPhone's smooth and fun user experience, you've got to give Microsoft credit for hyping Windows Mobile 6.5 as a totally unexciting workhorse.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Beyond PCI Checklists
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Click here.


Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More

 

September 07, 2009

TOP STORIES | MOST DUGG STORIES

  1. Raytheon snaps up Internet pioneer BBN Technologies
  2. The 11 most influential microprocessors of all time
  3. Developer denies software to beat Chinese censors is malicious
  4. Cisco, EMC starting new joint venture company?
  5. Wi-Fi encryption cracked in 60 seconds
  6. Half of new servers are virtualized, survey finds
  7. 12 cool ways to donate your PC's spare processing power
  8. Still trying to crack Nazi Enigma messages
  9. Snow Leopard vs. Windows 7
  10. 12 words you can never say in the office

Unified Communications Today
Do you know the business value of unified communications? Get the answer to this and many other UC questions at this Solution Center. Learn how your peers are lowering costs and improving collaboration. Get your most pressing UC queries answered from industry experts and read the very latest UC news.
Access this site.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment