Wednesday, July 01, 2015

How to deploy tablets to your mobile workforce

How Cisco brings communications to disaster relief efforts | One third of enterprise iOS devices vulnerable to app, data hijacking attacks

Network World Mobile & Wireless

How to deploy tablets to your mobile workforce
When Wakefield Canada, the exclusive distributor for Castrol in Canada, set out to replace the tablets used by their sales team, it went right to the source to figure out what to buy: The people who would be using them in the field.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

Buyer's Guide to Mobile Application Platforms
Good mobile app development requires more than a compelling user interface. In fact, the majority of the cost and effort happens behind the UI – the app testing, integration, security, quality assurance and ongoing management. Learn More

WEBCAST: Dell Inc.

Re-architecting Legacy Applications for the Enterprise
In this webcast, Ovum IT Services Analyst Hansa Iyengar and Cameron Jenkins, Dell Application Modernization Services Executive Director Cameron Jenkins discuss the importance of re-architecting legacy applications and provide practical recommendations to address the challenges around migrating legacy architecture. View now

How Cisco brings communications to disaster relief efforts
Although Cisco Live 2015 is in the books now, the memories of it certainly lives on. Each event I attend is different and gives me a better understanding of how Cisco operates as a company. I've written many posts over the years on Cisco's ability to be innovative to capture market transitions and drive the company's growth. One of the things I've liked about Cisco over the years is the philanthropic side to the company that resonates from CEO John Chambers down to all of the employees. I've heard Mr. Chambers talk on more than one occasion about corporate social responsibility and how important that is to the Cisco culture.One of the more interesting discussions I had around this topic at Cisco Live was with Sue-Lynn Hinson, who manages what Cisco calls the Tactical Operations (TacOps) team. The goal of this group isn't to drive sales or to market the latest and greatest product. Sue-Lynn never goes on sales calls and she and her team have no quota to fill. Instead, the TacOps team spends its time travelling the globe to establish emergency IP-based communications to first responders, government agencies, relief organizations, and others in times of emergency caused by disasters or other incidents. To read this article in full or to leave a comment, please click here Read More

One third of enterprise iOS devices vulnerable to app, data hijacking attacks
Apple released patches for several exploits that could allow maliciously crafted applications to destroy apps that already exist on devices, access their data or hijack their traffic, but a large number of iOS devices are still vulnerable.The vulnerabilities allow for so-called Masque attacks because they involve the impersonation of existing apps or their components. Three of them were patched in iOS version 8.1.3 that was released in January and two newer ones were patched in iOS 8.4, released Tuesday.In order to attack iOS devices with these flaws, hackers would have to trick their owners into installing rogue apps through the enterprise provisioning system. Companies use this mechanism to deploy in-house developed apps that are not published on the official App Store.To read this article in full or to leave a comment, please click here Read More

Skype for Business preview adds support for massive meetings, cloud-based phone administration
Businesses that use Microsoft’s Skype for Business communication product have some new beta features to play with that make the enterprise messaging and calling product more useful.The features, which were first announced earlier this year when Microsoft officially rebranded its Lync service as Skype for Business, allow businesses to create large-scale meetings and better integrate Skype for Business with traditional phone lines. It’s all designed to make the service more appealing for enterprises when those features enter general availability later this year.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

How to Develop & Maintain Fast and Always-On Apps with Ease
People expect instantaneous response and 24x7 uptime from today's digital applications. But the complexity, velocity, and volume of data in these applications often bring traditional database servers to their knees or send costs through the roof. Read this whitepaper to learn how to develop and maintain your apps with ease. Learn More

127 devices added to the Internet each second, but Congress is clueless about IoT
Tick tock, every second 127 items are added to the Internet, according to calculations by Stringify CTO Dave Evans, former chief futurist at Cisco. That adds up to about "328 million things" that "are being connected every month, approximately one for each person in the U.S. By the time you finish reading this article, more than 100,000 new things will have been added to the Internet." Those IoT things are collecting data that tells your story, perhaps much more personal tidbits than you would likely share. Yet as the "world we inhabit is becoming a digital landscape, one that tracks and responds to each of us," is "anyone in Washington paying attention?"To read this article in full or to leave a comment, please click here Read More

The battle for the wireless networking crown is heating up
A flurry of new partnerships and announcements suggests the market is getting competitive. Read More

FIDO two-factor authentication goes wireless
The FIDO Alliance is issuing a new specification for FIDO to support Bluetooth, low-energy Bluetooth (BLE) and near field communications (NFC) wireless technologies in two-factor authentication tokens, according to FIDO Alliance executive director Brett McDowell. Read More


WEBCAST: IBM

IBM Exceptional Digital experience Solutions Overview video
Watch this video to see how you can create exceptional digital experiences, and learn about other companies that have used IBM technology to reinvent digital engagement. Learn More

LTE-U is coming to take your Wi-Fi away, consumer advocates warn
A carrier technology that uses Wi-Fi frequencies to provide LTE connectivity could let the big wireless providers mess with your home connection and push you on to their networks, according to comments filed today with the FCC by several watchdog groups. Read More

Wow! Facebook's new logo doesn't do that
I’m not a graphic artist. I’m not an artist of any kind. And I don’t know much about typography or much care about typography.In other words, I’m like 99% of human beings who will look at Facebook’s new logo and Facebook’s old logo, above, and see not much difference. Or maybe they’ll see no difference at all until someone helps by pointing out the minor alterations (look at the “a” and spacing).However, not everyone is as unimpressed by the changes as most of us will be, according to this story in the Wall Street Journal.To read this article in full or to leave a comment, please click here Read More

iPhone 7 rumor rollup: Nixing those homely antenna lines; flexible displays on the way?
The latest Apple iPhone 6S and iPhone 7 smartphone rumors involve the possible abandonment of unsightly antenna lines on the back of the devices as well as word that OLED screens might be on the way. Read More

INSIDER
A look at the new Microsoft Skype for Business Server 2015
In March, Microsoft released Skype for Business Server 2015, its enterprise communications product that is the successor to both Lync Server for on-premises installations and Lync Online for cloud customers.To read this article in full or to leave a comment, please click here(Insider Story) Read More

INSIDER
Who's winning the mobile payments war?
Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

7 command line tools for monitoring your Linux system

Here is a selection of basic command line tools that will make your exploration and optimization in Linux easier.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. LTE-U is coming to take your Wi-Fi away, consumer advocates warn

2. Leap second causes Internet hiccup, particularly in Brazil

3. Kicking Google out of my life, Part 4: Goodbye, Gmail

4. How computer science education has changed

5. 19 free cloud storage options

6. Cisco to buy OpenDNS to boost Security Everywhere initiative

7. 7 command line tools for monitoring your Linux system

8. The battle for the wireless networking crown is heating up

9. Peeping into 73,000 unsecured security cameras thanks to default passwords

10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment