You received this because you subscribed to it through ITworld.com. Unsubscribe information below. Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.
|
 |
 |
October 7, 2005 An eNewsletter published by wireless.itworld.com Part of the ITworld.com Site Network
|
In today's update
Feature: More than just a cell phone
In the news: - Nokia puts Symantec on its mobile phones - Researchers: SMS attacks could cripple cell phones
Webcasts and white papers: - Adoption of Mobile Technologies - Selective access in wireless network security
Go figure: Google Wi-Fi will grab a broadband slice - but not the whole pie
ITwhirled: Booths silence cell-phone boors
From the network: - Webcast Addresses Key Business Intelligence Technologies FEATURE
More than just a cell phone I have a cell phone -- it's an old-fashioned model, a single, rigid piece that doesn't flip open like the ones on "Star Trek." It doesn't connect to the Internet, and it doesn't have a camera. The only extra frill it has is the address book, which is all I need. But as usual, I'm behind the times, a day late and a dollar short, and according to my friends with camera phones, living in the dark ages. IN THE NEWS
Get the latest news here... GO FIGURE 20 percent Portion of the broadband market a service like Google Wi-Fi could capture. Source: IDG News Service
WEBCASTS AND WHITE PAPERS Adoption of Mobile Technologies - New Webcast Mobile and wireless technologies must be considered an extension of an enterprise's IT infrastructure. To learn more about the latest mobile and wireless technology offerings, watch this Webcast now. Selective access in wireless network security Complexity is a major enemy of security. Learn about highly integrated products from leading manufacturers that include all of the elements of security in one place. Watch this new Webcast now. View more webcasts... Read additional white papers...
ITWHIRLED Booths silence cell-phone boors Here's an idea... The next time you are out and about and have the urge to, say, make a phone call to your doctor about some sensitive personal issue, rather than blurt it out for all to hear, step into one of these specially designed privacy boxes. Nothing short of revolutionary. More offbeat news, reviews and other stuff...
FROM THE NETWORK:
How to Choose the Right Search Engine for Your Business If you're serious about implementing effective site and intranet search, you need to read Verity's new white paper and learn what pitfalls to avoid that plague even the most seasoned technology buyers.
Enterprise Communications: Dawn of a New Era Second generation communication technology is now being developed to include VoIP telephony, unified messaging, unified communications and speech recognition based technologies. Learn more in this new webcast now.
Webcast Addresses Key Business Intelligence Technologies Join leading industry analyst, Peter Burris, as he takes you through the circumstances faced by many businesses as they utilize business intelligence to take better business actions in today?s competitive arena. Go now.
|
|  |
Wanted: Your two cents
Got a Best Practice? Share it here.
Got an idea for the newsletter? Send it our way.
|
| |
CUSTOMER SERVICE: Manage subscriptions | Newsletter FAQs CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network
Brought to you by: Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA Privacy Policy Copyright © 2005 All rights reserved.
|
Click here to forward this message to a friend!
Click here to change or remove your subscription.
No comments:
Post a Comment