Wednesday, October 05, 2005

Wireless Strategies: Embrace RFID, shun piecemeal security


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 October 5, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Technologies to embrace and run away from

›› In the news:
- WiMax 'just around the corner'
- Mobile industry focuses on handsets for the poor


›› Webcasts and white papers:
- Adoption of Mobile Technologies
- Selective access in wireless network security


›› Go figure: China chock-full of mobile phone users

›› ITwhirled: Booths silence cell-phone boors

›› From the network:
- Enterprise Communications: Dawn of a New Era

›› FEATURE

Technologies to embrace and run away from
Which IT technologies should you embrace and which should you run away from? That's easy, according to Kevin McKean, president of McKean Media, stay away from grid computing, mainframes and piecemeal security solutions. The five hottest enterprise trends to embrace are RFID, service orientated architecture (SOA), virtualization, software-as-a-service, and IPTV.


›› IN THE NEWS

WiMax 'just around the corner'
Strix talk WiMax mesh future
New BenQ, Siemens mobile phone company opens
Mobile industry focuses on handsets for the poor

Get the latest news here...


›› GO FIGURE

372.8 million
Number of mobile phone users in China.
Source: IDG News Service


›› WEBCASTS AND WHITE PAPERS

Adoption of Mobile Technologies - New Webcast
Mobile and wireless technologies must be considered an extension of an enterprise's IT infrastructure. To learn more about the latest mobile and wireless technology offerings, watch this Webcast now.

Selective access in wireless network security
Complexity is a major enemy of security. Learn about highly integrated products from leading manufacturers that include all of the elements of security in one place. Watch this new Webcast now.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

Booths silence cell-phone boors
Here's an idea... The next time you are out and about and have the urge to, say, make a phone call to your doctor about some sensitive personal issue, rather than blurt it out for all to hear, step into one of these specially designed privacy boxes. Nothing short of revolutionary.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

How to Choose the Right Search Engine for Your Business
If you're serious about implementing effective site and intranet search, you need to read Verity's new white paper and learn what pitfalls to avoid that plague even the most seasoned technology buyers.

Enterprise Communications: Dawn of a New Era
Second generation communication technology is now being developed to include VoIP telephony, unified messaging, unified communications and speech recognition based technologies. Learn more in this new webcast now.

Webcast Addresses Key Business Intelligence Technologies
Join leading industry analyst, Peter Burris, as he takes you through the circumstances faced by many businesses as they utilize business intelligence to take better business actions in today?s competitive arena. Go now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

NetSupport Manager PC Remote Control
Perform remote support and management on multiple systems simultaneously over a LAN, WAN and the Internet with this PC remote control software. Provides speedy, secure remote PC access, dynamic inventory, automated scripting and more.
Stay Out of the Headlines!
Lost or stolen laptops, desktops - even USB devices - may expose your business to significant regulatory compliance issues and brand damage. CREDANT's revolutionary intelligence-based encryption secures your data no matter where it is stored.
Protect Yourself at WiFi Hotspots with PublicVPN
PublicVPN.com protects your WiFi connection from snoops by scrambling all the data you send and receive at your WiFi hotspot. Shield your online activity from prying eyes when you're out of the office with our easy, secure, and affordable service.
Remote Access - Remote PC
RemotePC provides secure remote access for mobile and call center professionals for remote support via Internet.
Mobile Computing at LaptopParts.com
LaptopParts.com offers a large variety of mobile computing parts, replacements, and more.
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



No comments: