Tuesday, November 08, 2005

Check employees' home computers for threats to your network

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
11/08/05
Today's focus: Check employees' home computers for threats to
your network

Dear networking.world@gmail.com,

In this issue:

* Lessons from across the pond
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118769
_______________________________________________________________
INDUSTRY GROUP PLANS VOIP BEST PRACTICES

The potential threats to VoIP networks are many and include:
theft of service, spamming, intentional disruption of services,
number harvesting and more. An industry group is working toward
a best-practices document that will spell out for businesses how
to build secure VoIP networks using specific makes and models of
equipment. More:
http://www.fattail.com/redir/redirect.asp?CID=119269
_______________________________________________________________

Today's focus: Check employees' home computers for threats to
your network

By Michael Osterman

In late October, I had the privilege of participating at the
Message05 event in London, an event focused on the e-mail
industry in the U.K and beyond. One of the more interesting
parts of this conference was the roundtable discussions in which
vendors, IT managers and others were given 90 minutes to kick
around a variety of issues - the two I led were focused on
content security and e-mail hygiene. Here are a couple of the
more interesting takeaways from the conference:

* One of the U.K.'s largest employers recently experienced a
major incident that brought its e-mail system and the rest of
its network to a complete halt for three days. It took a full
four weeks for all of the servers to be patched. At the time of
the conference, the company's IT management still didn't know
what caused the outage - it could have been anything from an IM
worm to a virus brought in on a USB keychain device. The company
has spent enormous sums of money combating the effects of
whatever caused the outage and reinforcing its defenses to
prevent something else like this from happening again.

* When Volvo negotiates with security vendors for new systems,
the company requires that its employees are provided with the
same desktop capabilities for use at home. Volvo's thinking is
that because a lot of its employees do work from home, it's
critical to make sure that threats cannot enter the corporate
network by way of users' personal machines.

Both of these points illustrate the critical need for
organizations of all sizes to focus on a wide and growing array
of threats that could easily impact their networks. A single
piece of code, for example, one that could bring down a network
for days, can enter through an e-mail, an image file embedded in
an e-mail, a single IM, a USB keychain device, a diskette, an
employee's laptop, an employee's home machine, a contractor's
machine, an employee's child or any of a variety of other
sources. It is critical, therefore, to protect every avenue by
which a threat could enter a network, not just those in the
workplace.

The top 5: Today's most-read stories

_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118768
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
FEATURED READER RESOURCE

WHO'S IN THE HOT SEAT?

Now available on NetworkWorld.com is Network World's Hot Seat
with John Gallant. Guests on the Hot Seat, which include vendor
executives and industry luminaries, give candid answers to
pointed questions. These 5-minute video clips are sure to keep
you informed and entertained. Click here to see who is in this
week's Hot Seat:

<http://www.networkworld.com/nlmsg10753>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Monday, November 07, 2005

Wireless Strategies: Microsoft loves (wireless) Linux?


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 November 7, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Bluetooth security help

›› In the news:
- Microsoft trusts Linux with its internal wireless network
- Unpatched Cisco/Airespace WLANs at risk

›› Webcasts and white papers:
- On the road to wireless network security nirvana

›› Go figure: CDMA phones ship in volume

›› ITwhirled: Seatback computers to turn Irish airliners into flying casinos

›› From the network:
- Webcast Addresses Key Business Intelligence Technologies

›› FEATURE

Bluetooth security help
During the Network World Remote Office Technology Tour stop in Washington D.C. last spring, my friend Chuck W. ambushed me with a security question: How do you keep Bluetooth secure? I immediately blurted, "stay at least thirty feet away from everyone." Unfortunately, that's been about the only security help Bluetooth fans had until now. AirMagnet (.com), the wireless security folks, just released BlueSweep, a free utility.


›› IN THE NEWS

Westchester County: Wi-Fi Internet cafes 'must have firewall'
Microsoft trusts Linux with its internal wireless network
Unpatched Cisco/Airespace WLANs at risk
New Linux kernel delivers better Wi-Fi, better filesystems

Get the latest news here...


›› GO FIGURE

51 to 53 million
Number of W-CDMA and CDMA phones Qualcomm expects to ship in the first quarter of this fiscal year.
Source: eWeek


›› WEBCASTS AND WHITE PAPERS

On the road to wireless network security nirvana
Tune into this new Webcast and gain a better understanding about how to prepare a plan and a policy before you invest in technology. Watch now.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

Seatback computers to turn Irish airliners into flying casinos
Low-cost Irish airline Ryanair has already experimented with video game consoles built into seatback computers. Now the upstart company is considering electronic gambling devices - and the company CEO thinks that such machines will bring in so much money that there will be no need to charge airfares.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

Webcast Addresses Key Business Intelligence Technologies
Join leading industry analyst, Peter Burris, as he takes you through the circumstances faced by many businesses as they utilize business intelligence to take better business actions in today�s competitive arena. Go now.

Device Relationship Management And Document Management Technology
Discover a solution that enables you to see all of your network devices with minimal impact to the organization, provides critical information to make informed business decisions, and doesn't require IT management. Go now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

Broadband Mobile Satellite Modem
Mobile data transfer at up to 3 times speed of GPRS, coverage in 99 countries, packet data service so you are charged for data transferred not time spent online.
Specials and Free Shipping on all Headset Brands
Crystal clear calls from every Headset Innovations headset. Exceptional quality and very affordable pricing delivers the best solutions to your headset needs. Click to find special offers. Satisfaction Guaranteed and 30 day return policy.
Detect and Protect Your PDAs and Smartphones
This white paper will guide you step-by-step through the best practices for securing PDAs and smartphones, along with the benefits of implementing a CREDANT Technologies solution for detecting and protecting these popular productivity tools.
Protect Yourself at WiFi Hotspots with PublicVPN
PublicVPN.com protects your WiFi connection from snoops by scrambling all the data you send and receive at your WiFi hotspot. Shield your online activity from prying eyes when you're out of the office with our easy, secure, and affordable service.
Wireless - PDA & Cell Phone Batteries - AtBatt.com
Tired of low battery reading? AtBatt.com can provide fresh power to your wireless devices. Simply choose your Brand and Model from our database to find your correct battery. Black Berry, Dell, HP, Toshiba, Nokia, Motorola and more.
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



Friday, November 04, 2005

John Gallant Spotlights Top Network News and Issues in VORTEX Digest for Nov. 4, 2005

VORTEX Digest
John Gallant Spotlights Top Network News and Issues
Comments to: mailto:jgallant@vortex.net
Nov. 4, 2005
Volume 7, Number 6
*********************************************************
In This Issue:
* Thoughts from VORTEX 2005
* Focus on what's core to you
* Vendors and customers move forward together
* Subscription information
*********************************************************
"I may not have gone where I intended to go, but I think I have
ended up where I intended to be."

Douglas Adams

Dear Vorticians,

After spending months preparing for VORTEX 2005 and then two-and-
a-half whirlwind days at the conference with 30 speakers in 19
different interviews, panels and presentations, it's difficult to
put the whole shooting match into perspective. In a way, it's all
a blur that will take some time to sort out. Some real highlights
stand out in my mind and, as with any event, a couple of
disappointments. Some speakers and sessions exceeded expectations
in ways I couldn't have predicted, and some discussions or topics
didn't generate the spark I'd hoped.

As Douglas A. says above, VORTEX 2005 may not have always gone
where we expected it to go, but we certainly ended up where we
intended. That's because the two fundamental premises of VORTEX
were validated in resounding fashion.

First, Geoffrey Moore and I began our work together on this
project with the belief that the enterprise IT industry is
undergoing profound change, and that both IT customers and
providers are wrestling with the impact of that change. They're
trying to apply and deliver technology in new ways and struggling
with how to improve the value they deliver - either to customers
or, in the case of IT executives, to the business.

This came out in a variety of ways:

* Geoff's keynote focusing on how to spark innovation by
stripping away resource-draining contextual activities and
realigning people and money to where they will have far more
influence on the things that really make a difference for your
company - the things that are core to you. That theme was fleshed
out by CIOs from companies like Levi Strauss, Nortel, Electronic
Arts and Fidelity who talked about how they are dealing with the
core/context challenge every day. (Here's a link to Geoff's soon-
to-be-released book "Dealing with Darwin":
http://www.networkworld.com/nlvortexdarwin)

* Microsoft's Ray Ozzie and Sun's Greg Papadopoulos explored the
ramifications of the movement toward software as a service. This
was a great prelude to Microsoft's announcement this week of its
services plans. Read more here:
http://www.networkworld.com/news/2005/110105-gates-ozzie.html.

* Cassatt's Bill Coleman and CIOs from Hasbro and DolphinSearch
debated and prognosticated on the inevitability of utility
computing and what it means for IT departments and the IT
industry.

* AT&T's Ed Amoroso talked about how security must change because
our current defenses are fundamentally flawed and cannot be
fixed. The security challenge rang out loud and clear during the
event, with CIOs in a roundtable discussion citing security as
their top concern and attendeess voting resoundingly that
security problems will be with us for a long, long time.

* Services oriented architecture is taking root in corporations
and the payoffs will be huge. In fact, some 80% of the VORTEX
attendees say SOA presents "rich opportunities for investors and
entrepreneurs."

* Mobility technologies are changing business dramatically, as
the CIOs on our wireless panel detailed. This seems particularly
true in the IT-challenged health care field, where the providers
we talked to are fundamentally rewriting the rules of their game.

The second premise of VORTEX is that it's imperative that both
vendors and IT executives explore these issues together in order
to speed the evolution of enterprise IT. This year, with help
from the new CIOs on our advisory board, our program better
reflected the concerns of the buy side and, as a result, we had
many, many more senior IT executives in the room. They, and the
top vendor executives in attendance, got a better understanding
of each other's needs and strategies. That may have been the most
important thing to come out of the event.

There's additional coverage of speakers and sessions in the
VORTEX Blog (http://www.networkworld.com/weblogs/vortex/) and in
upcoming days I'll share some more thoughts as well as links to
coverage from the event.

Thanks for all the input you provided to help make VORTEX 2005 a
success. Bye for now.

*********************************************************
Tell a Friend
*********************************************************

Is there a friend or colleague you'd like to have join the
discussions held here at VORTEX Digest? Have them subscribe to
receive the weekly Digest at:
http://www.nwwsubscribe.com/Changes.aspx

*********************************************************
ABOUT VORTEX DIGEST
*********************************************************

VORTEX Digest is a weekly summary of the VORTEX Blogs written by
Executive Producer John Gallant and offers an ongoing dialogue
on matters raised at The VORTEX Conference, and within the VORTEX
Community.

VORTEX is an exclusive, invitation-only event for senior
executives that brings together all the key elements: leadership,
thought, funding, and regulatory expertise, to shape the future
of the network business and the technologies that drive it.
VORTEX shakes off the hype and helps you understand where you can
win new customers, and find new revenue in a time of dramatic and
seemingly unpredictable change.

*********************************************************
SUBSCRIPTION INFORMATION
*********************************************************

To subscribe or unsubscribe to any Network World e-mail
newsletters:
http://www.nwwsubscribe.com/Changes.aspx

To view the VORTEX Blogs:
http://www.networkworld.com/weblogs/vortex/index.html

To access the VORTEX Digest archives:
http://www.networkworld.com/newsletters/vortex/index.html

To unsubscribe from promotional e-mail:
http://www.nwwsubscribe.com/Preferences.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

Have editorial comments? Contact John Gallant at
mailto:jgallant@VORTEX.net

For advertising information:
mailto:sponsorships@nwfusion.com

Copyright: Network World, Inc. 2005

Wednesday, November 02, 2005

Mailbag: Fixed, mobile systems live together in harmony

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
11/02/05
Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

Dear networking.world@gmail.com,

In this issue:

* Readers reply to fixed vs. mobile debate
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118728
_______________________________________________________________
SIGN UP FOR 51 FREE ISSUES OF NETWORK WORLD MAGAZINE

Everyone is talking about the convergence of voice and data onto
the same infrastructure. Convergence touches on virtually every
aspect of the network, from the call center to the wireless LAN.
Find out what Network World Editors have to say each week in our
print publication.
SUBSCRIBE NOW AT:
http://www.fattail.com/redir/redirect.asp?CID=118568
_______________________________________________________________

Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

By Steve Taylor and Larry Hettick

Last week, we published a mock debate on the virtues of fixed
vs. mobile solutions
http://www.networkworld.com/nlconvergence9799. Today, we'd like
to share a few reader replies to our discussion.

First, we'll hear from David J. Green, senior Internet marketing
and security consultant at NetGreen Consulting. Green has
succinctly answered the debate with a matrix approach,
suggesting that wireline services (just barely) edge out
wireless solutions for enterprise applications.

He suggests that, "whoever can provide 'good enough' service
that is fast, cheap and easy to use will win."

Green's matrix is shown below, using a scale of 1-5 with 5 being
high:

Good enough: Wireless-3, Wireline-4
Fast: Wireless-2, Wireline-4
Cheap: Wireless-3, Wireline-2
Easy to use: Wireless-4 Wireline-3

Totals: Wireless-12 Wireline-13

Next, we hear from Madhusudhan Mendu, who states, "My opinion is
it all depends on the business need."

Mendu suggests that the both wireline and wireless services will
"complement each other." In one example, he notes that mobile
"backhaul still needs wireline connectivity" and that "end users
[still need] wireline broadband access." In another example, he
cites a sales representative's need for "mobile connectivity for
access to his CRM system on his mobile device while on the move"
vs. the "end user who requires larger screen/intense application
like IPTV [that] will choose wireline broadband access."

As a parallel, he asks: "Did watches replaced clocks?" or "Did
cell phones replace desk phones?" - concluding that in both
cases neither solution displaced the other, and that both
continue to exist as complementary solutions.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
http://www.networkworld.com/nlconvergence10163
2. Gates, Ozzie go 'Live' with Microsoft services plan
http://www.networkworld.com/nlconvergence10164
3. Telecom merger approvals get mixed reviews
http://www.networkworld.com/nlconvergence10165
4. AT&T: Fall of an icon
http://www.networkworld.com/news/2005/103105-att.html?t5
5. FCC okays telecom mergers with conditions
http://www.networkworld.com/nlconvergence10166

_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials http://www.webtorials.com/, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
mailto:taylor@webtorials.com

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
mailto:lhettick@currentanalysis.com
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118727
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

http://www.networkworld.com/nlconvergence10167
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
http://www.nwwsubscribe.com/Changes.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: mailto:jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: mailto:sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Vulnerable security algorithms raise concerns

All the week's news and views about Network/Systems Management,
11/02/05
_______________________________________________________________
This newsletter is sponsored by Hitachi
Strategies for Midsize Businesses: How to Achieve
Enterprise-Class Business Continuity and Data Governance on a
Midrange Budget, Produced by Network World.

IT professionals running midsize operations have to be prepared
for time and monetary constraints regarding continuity, data
governance, compliance and data management. The following
special report: Strategies for Midsize Businesses: How to
Achieve Enterprise-Class Business Continuity and Data Governance
on a Midrange Budget addresses these issues in a timely way
http://www.fattail.com/redir/redirect.asp?CID=118663
_______________________________________________________________
BUILDING THE NEXT-GENERATION DATA CENTER

A next-generation data center relies on commoditized pools of
resources that can be combined to support a variety of
applications. But how can organizations transform their data
centers to the next-generation model? Nemertes Research has
reviewed over 120 products and selected those that will best
help you build your next-generation data center. Click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=118500
_______________________________________________________________

Network World's Network/Systems Management News Alert

Vulnerable security algorithms raise concerns, 11/01/05

Industry experts agree that the future of two widely used
security algorithms is fated, but with no clear alternatives in
sight products that rely on them may have to remain "good
enough" for some time.
<http://www.networkworld.com/nlnetsystemsmgmt10211>

ScriptLogic spices management tool with inventory, patching,
anti-spyware, 10/31/05

ScriptLogic Tuesday plans to release the next version of its
desktop management software that adds inventory, management, and
security controls to the platform.
<http://www.networkworld.com/nlnetsystemsmgmt10212>

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
<http://www.networkworld.com/nlnetsystemsmgmt10213>
2. Gates, Ozzie go 'Live' with Microsoft services plan
<http://www.networkworld.com/nlnetsystemsmgmt10214>
3. Telecom merger approvals get mixed reviews
<http://www.networkworld.com/nlnetsystemsmgmt10215>
4. AT&T: Fall of an icon
<http://www.networkworld.com/news/2005/103105-att.html?t5>
5. FCC okays telecom mergers with conditions
<http://www.networkworld.com/nlnetsystemsmgmt10216>

_______________________________________________________________
To contact:

Senior Writer Denise Dubie covers network and systems management
for Network World. Reach her at <mailto:ddubie@nww.com>.
_______________________________________________________________
This newsletter is sponsored by Hitachi
Strategies for Midsize Businesses: How to Achieve
Enterprise-Class Business Continuity and Data Governance on a
Midrange Budget, Produced by Network World.

IT professionals running midsize operations have to be prepared
for time and monetary constraints regarding continuity, data
governance, compliance and data management. The following
special report: Strategies for Midsize Businesses: How to
Achieve Enterprise-Class Business Continuity and Data Governance
on a Midrange Budget addresses these issues in a timely way
http://www.fattail.com/redir/redirect.asp?CID=118662
_______________________________________________________________
ARCHIVE LINKS

Management news page Latest management news, analysis and
newsletters http://www.networkworld.com/topics/management.html
_______________________________________________________________
Anytime, anywhere networking in the wireless world

Learn about the rapidly changing world of wireless networks and
mobile devices.
http://www.fattail.com/redir/redirect.asp?CID=118590
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

<http://www.networkworld.com/nlnetsystemsmgmt10217>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Thursday, October 27, 2005

Wireless Strategies: U.S. to require RFID chips in passports


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 October 26, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: VoWi-Fi telephony takes another giant leap forward

›› In the news:
- U.S. to require RFID chips in passports
- Nokia rolls out entry-level CDMA phones


›› Webcasts and white papers: Simplifying wireless network security

›› Go figure: That's a lot of cell phones!

›› ITwhirled: Our employers, ourselves

›› From the network: AVST Market Insight


›› FEATURE

Telephony takes another giant leap forward
VLAN, or sending voice traffic over fast Ethernet wired LANs, is an excellent idea and already saves companies a lot of money. But voice over wireless LAN (VoWLAN) technology may be the next step. Although the WLAN has a lot less bandwidth than a 100 Mbps Fast Ethernet wired network, there is a case to be made for it. Infonetics Research notes the growing presence of WLANs in the enterprise, predicting that WLAN deployments will increase threefold over the next two years, in part, driven by the availability of wireless VoIP handsets and voice-enabling wireless technology. Telecom pricing structures based on time and distance are being challenged by VoIP providers (giving incumbent telcos a run for their money), and wireless VoIP will further disrupt the industry as it presents more innovation and competitive opportunities.

RELATED: Voice over WLAN to triple by 2007: Report


›› IN THE NEWS

U.S. to require RFID chips in passports
Nokia rolls out entry-level CDMA phones
New mobile Linux group to launch next month
BellSouth goes wireless for Katrina recovery
Sun, Alcatel sign deal to work on core network gear
NTT DoCoMo sells stake in KPN Mobile

Get the latest news here...


›› GO FIGURE

800 million
Number of mobile phones that will be sold worldwide in 2005.
Source: Reuters, via Computerworld


›› WEBCASTS AND WHITE PAPERS

Simplifying wireless network security
The convenience of wireless is undeniable, but we need to add new security solutions, without setting up a separate world for wireless and for wire. Tune into this new Webcast and learn more.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

Our employers, ourselves
It's only natural... genetic testing leads to concerns about genetic privacy, which leads to, you guessed it, IBM revising its equal opportunity policy to state that genetic information would not be used in employment decisions. Big Blue may not want to play big brother, but don't think for a minute that other organizations won't jump at the opportunity.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

Are You Benefiting From Blade Servers? Learn how now!
Server blades leverage shared components, support virtualized server resources and contain a unified management interface. Learn more about the benefits of server blades in this new IDC White Paper now.

The Seven-Step Unified Communications Strategy
Discover a second-generation enterprise communications solution with a robust set of user and management features that can help your organization tame the communications beast and hone the competitive edge it needs to stay ahead of the pack. Go now.

AVST Market Insight
If you're in the process of evaluating how to upgrade your current enterprise communications infrastructure, then get your copy of this new Webletter, which includes a Q & A session with the experts and provides you with information you need to facilitate the decision-making on this important topic. Go now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

Buy, Sell or Rent Used Cisco Equip-Save up to 85%
Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.
Detect and Protect Your PDAs and Smartphones
This white paper will guide you step-by-step through the best practices for securing PDAs and smartphones, along with the benefits of implementing a CREDANT Technologies solution for detecting and protecting these popular productivity tools.
Specials and Free Shipping on all Headset Brands
Crystal clear calls from every Headset Innovations headset. Exceptional quality and very affordable pricing delivers the best solutions to your headset needs. Click to find special offers. Satisfaction Guaranteed and 30 day return policy.
Broadband Mobile Satellite Modem
Mobile data transfer at up to 3 times speed of GPRS, coverage in 99 countries, packet data service so you are charged for data transferred not time spent online.
WI-Fi Security Software for Small Business
LucidLink combines ease of use with award-winning enterprise-level security for your 802.11 wireless LAN. Easily configure the access point and set up LucidLink security in 15 min, out of the box. Add or remove users with one click. - Free Download!
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.