Monday, October 24, 2011

iPad 2 vs. business class tablets

Wi-Fi devices crowd 2.4GHz band; IT looks to 5GHz | A Visual Tour of the Nokia Test Center

Network World Daily News AM

Forward this to a Friend >>>


iPad 2 vs. business class tablets
Tech lovers have been flocking to the iPad 2 and other tablets in order to watch movies, read books, surf the Web and make video calls on the latest, greatest, thinnest, lightest, coolest devices. But where do tablets fit within the enterprise? [Free Insider registration required] Read More


WHITE PAPER: Avaya

Avaya: Creating Fit for Purpose Data Center Networking
Simplified and optimized service orchestration maximizes the return from a virtualized computing environment. Click to read the White Paper.

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn more!

Wi-Fi devices crowd 2.4GHz band; IT looks to 5GHz
Of the 470,000 Wi-Fi connections made on a recent day at Abilene Christian University, fully 94% used the 2.4GHz band, representing an extreme example of how today's surging number of Wi-Fi clients is crowding the band least able to accommodate them. Read More

A Visual Tour of the Nokia Test Center
Nokia puts its phones through rigorous testing before they land in customers' hands. We had the opportunity to take a tour of the Nokia Test Center, just outside of San Diego, and witness some of these tests. Read More

iPhone 5 rumor rollup for the week ending Oct. 21
For the iOSsphere, it's like the iPhone 4S never happened. The fever of speculation around the Next Apple iPhone rises and ebbs like a great tide, ever restless. Read More



Nudging IT forward
There is basic agreement on the nirvana vision for the next-generation data center, but the tricky part is getting there from here. Read More

Widely used encryption standard is insecure, say experts
A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say. Read More

Forget new threats: It's the old-school attacks that keep getting you
Everybody in IT knows it is a dangerous world out there, filled with an endless variety of cyber attacks aimed at compromising and taking advantage of security flaws. Read More


WHITE PAPER: BMC

5 steps from Scheduler to Enterprise Workload Automation
A patchwork of job schedulers can cause many inefficiencies, hindering IT's ability to serve the business. An enterprise approach solves these issues and adds new value. Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service. Learn More!

World's most sophisticated rootkit is being overhauled
Experts from security vendor ESET warn that TDL4, one of the most sophisticated pieces of malware in the world, is being rewritten and improved for increased resilience to antivirus detection. Read More

Verizon sees revenue, net income gains
Verizon Communications reported gains in both revenue and net income for the third quarter of 2011, driven largely by growth in the company's mobile business. Read More

While we wait for cold fusion, let's update the ECPA
Gibbs wants you to get as excited about protecting your privacy as many of you are about cold fusion. Read More

10 LinkedIn Tips to Boost Your Job Search
Is your job search lagging? Not seeing the results you'd like? Check out these ten expert tips from CIO.com's Kristin Burnham to enhance your search. Read More



SLIDESHOWS

2011 tech industry graveyard
Fortunately for the tech industry, there's a lot more living than dying, with 2011 seeing the birth of everything from Apple's iPad 2 to the Google+ social network. But inevitably, 2011 has also seen its share of dead, killed, murdered, offed, obliterated companies, technologies and ideas as well. Here's your chance to pay last respects, and who knows, maybe a few of these will sprout back to life.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. With lions on the loose, that Twitter limit can bite
  2. Skype exploits: I know where you are, and how to best stalk you
  3. Cheap power: An overnight revolution
  4. Gartner: The top 10 strategic technology trends for 2012
  5. FAQ on Son of Stuxnet
  6. Gartner: 10 key IT trends for 2012
  7. Day 1: Giving up Windows 7 for Ubuntu 11.10 for two weeks
  8. Private social networks playing Facebook role in more workplaces
  9. Android smartphone smackdown: Droid Razr vs. Galaxy Nexus
  10. SQL injection attack has compromised nearly 200,000 ASP.Net sites

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: