Monday, January 30, 2012

First 'Super Wi-Fi' network goes live in North Carolina

What's hot at Macworld|iWorld 2012 | MacIT: IT groups grapple with managing fast-growing iOS devices

Network World Wireless

Forward this to a Friend >>>


First 'Super Wi-Fi' network goes live in North Carolina
Lucky residents of Wilmington, N.C., will be the first in the nation to have access to a "Super Wi-Fi" network. Read More


RESOURCE COMPLIMENTS OF: TamoSoft

Visualizing Your WLAN With TamoGraph
If your job involves Wi-Fi network deployment and maintenance, you know that it's virtually impossible to consider all the variables that might affect the health of a WLAN. Professional Wi-Fi site survey software provides visual insight into WLAN performance and can help reduce hardware costs and improve performance and coverage. Read More

WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

What's hot at Macworld|iWorld 2012
Macworld|iWorld seems to bring out the best, and sometimes the worst, in Apple-related creativity. Check out what's new, cool, and just strange at this year's show. Read More

MacIT: IT groups grapple with managing fast-growing iOS devices
Apple recently has improved its mobile device management features, but IT groups are discovering a new set of challenges when they start to move to larger numbers of iOS devices, MacIT conference attendees are confirming this week. Read More

Will RIM survive?
As Mike Lazaridis and Jim Balsillie step down as co-CEOs at Research in Motion, the company is at a cross roads. Thorsten Heins steps into the CEO chair with many daunting obstacles ahead of him and RIM. Read More

iPad 3 rumor rollup for the week of Jan. 26
As the faithful gathered in San Francisco this week for Macworld|iWorld, their faith seemed rewarded by a new spate of iPad 3 rumors. Read More

iPhone 5 rumor rollup for the week ending Jan. 27
A Reliable Source emerges this week to whisper sweet nothings in the quivering ear of the iOSsphere. Expectations flame. Read More


WEBCAST: HP, Microsoft & Intel

HP Enterprise Database Consolidation Appliance
Optimized for Microsoft® SQL Server 2008 R2, the preinstalled, pretuned HP Enterprise Database Consolidation Appliance simplifies database infrastructure management, improves resource utilization, and reduces costs resulting in exceptional levels of return. Learn more

Microsoft Windows Phone 7 app fights malaria
Microsoft has awarded an Imagine Cup Grant to a team that developed a custom Windows Phone 7 and application that can diagnose malaria then upload the data to cloud servers that map the data to help track outbreaks. Read More

Corporate PowerPoint files now play on iPad
Brainshark this week at Macworld|iWorld goes live with an enterprise version of its PowerPoint "translator" for the iPad. Read More

Company uses iPads instead of laptops in loaner program
A fast-growing media company has hit upon an iPad loaner program, which replaces laptops for occasional travelers. The Apple tablet's simplicity compared to the laptop makes it much easier to administer and use. Read More

AT&T chief bashes FCC, pleads for more spectrum
AT&T CEO Randall Stephenson is still unhappy that the Federal Communications Commission helped foul up his company's merger with T-Mobile. Read More

Android tablets finally catching on, says Strategy Analytics
It's taken a while but Android tablets may finally be starting to make a dent in Apple's share of the overall tablet market. Read More


WHITE PAPER: Riverbed

Making the Promise of Cloud a Reality
Whether a business builds out its own cloud or buys cloud services from someone else, they need to be sure the end results are optimized for the speed users require. This paper identifies where the limitations of cloud computing exist and provides actionable strategies to unleash cloud performance. Read now!

Hacking stunt: Stealing smartphone crypto keys using plain old radio
Encryption keys on smartphones can be stolen via a technique using radio waves, says one of the world's foremost crypto experts, Paul Kocher, whose firm Cryptography Research will demonstrate the hacking stunt with several types of smartphones at the upcoming RSA Conference in San Francisco next month. Read More

Rubinstein leaves HP
Jon Rubinstein, known for his role developing the original iPod for Apple and for running Palm, has left Hewlett-Packard, where he's worked since the company's acquisition of Palm. Read More

Happy birthday, iPad! RIP, pretenders
Two years ago today, Steve Jobs unveiled the iPad. Computing has never been the same, despite all the 'iPad killers' Read More

FTC to scrutinize mobile payment technology
Will mobile payments become common, and what will the impact of that technology be? Read More

802.11ac boosts buzz more than bandwidth
The buzz about 802.11ac is in full swing, but don't believe everything you read. Read More



SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Jan. 26
  2. First 'Super Wi-Fi' network goes live in North Carolina
  3. Cloud activity to explode in 2012
  4. 6 security companies to watch
  5. 15 worst Internet privacy scandals of all time
  6. Say goodbye to Fast Ethernet
  7. Stealing smartphone crypto keys using plain old radio
  8. Threatened by Anonymous, Symantec tells users to pull pcAnywhere's plug
  9. 10 best new Google Android apps for fun and, uh, work
  10. Social media 'private' data is fair game for e-discovery in court

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment