Sunday, October 16, 2005

Wireless Strategies: RFID: Food safety friend, network security foe?


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 October 17, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Is RFID secure?

›› In the news:
- Nokia to set up 3G joint venture in China
- RFID tags may help improve food safety


›› Webcasts and white papers:
- On the road to wireless network security nirvana

›› Go figure: Investing in flexibility a good idea

›› ITwhirled: What art is hiding on your microchip?

›› From the network: AVST Market Insight


›› FEATURE

Is RFID secure?
As is the case with many technologies, in the RFID realm the drive for new features may have left security behind. That's why it's key for organizations thinking of adopting RFID technology to do the due diligence on how it will affect their security level.


›› IN THE NEWS

Finnish technology may help curb mobile phone theft
Nokia to set up 3G joint venture in China
Pronto Networks sees opportunity in municipal Wi-Fi
RFID tags may help improve food safety

Get the latest news here...


›› GO FIGURE

$10 to $20 million
Cost to develop a single chip -- which means that, with wireless standards on the move, it makes sense to build flexibility in.
Source: IDG News Service


›› WEBCASTS AND WHITE PAPERS

On the road to wireless network security nirvana
Tune into this new Webcast and gain a better understanding about how to prepare a plan and a policy before you invest in technology. Watch now.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

What art is hiding on your microchip?
Somewhere in the circuitry of your computer's microchip may lurk cartoon characters, animals, cars, and a host of other images. This silicon "doodling" by chip designers is a tradition spanning more than three decades. Call it the cave art of our times.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

AVST Market Insight
If you're in the process of evaluating how to upgrade your current enterprise communications infrastructure, then get your copy of this new Webletter, which includes a Q & A session with the experts and provides you with information you need to facilitate the decision-making on this important topic. Go now.

The Seven-Step Unified Communications Strategy
Discover a second-generation enterprise communications solution with a robust set of user and management features that can help your organization tame the communications beast and hone the competitive edge it needs to stay ahead of the pack. Go now.

Operational Business Intelligence (BI): Taming the Data Explosion
This Paper examines the increasing evidence that intelligent process automation, deployed through operational BI software, delivers key capabilities for dealing with operation decision-making and compliance issues. See for yourself.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

NetSupport Manager PC Remote Control
Perform remote support and management on multiple systems simultaneously over a LAN, WAN and the Internet with this PC remote control software. Provides speedy, secure remote PC access, dynamic inventory, automated scripting and more.
assyst by Axios Systems - Wireless ITSM solutions
Our mobile solutions enable technicians and remote workers to update and action events using the latest PDAs & Blackberries etc - Regsiter Online for more information
Detect and Protect Your PDAs and Smartphones
This white paper will guide you step-by-step through the best practices for securing PDAs and smartphones, along with the benefits of implementing a CREDANT Technologies solution for detecting and protecting these popular productivity tools.
Hide your activity at WiFi Hotspots with PublicVPN
PublicVPN.com encrypts your Wi-Fi connection, scrambling all the data you send and receive at your Wi-Fi hotspot. Shield your online activity from prying eyes when you're out of the office with our easy, secure, and affordable service.
Remote Access - Remote PC
RemotePC provides secure remote access for mobile and call center professionals for remote support via Internet.
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



No comments: