Friday, September 11, 2009

802.11n pioneer sets ‘wicked fast’ expectations for wireless; Windows autorun may autoinfect

News podcast: Network World 360; Windows autorun may autoinfect
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Citrix Systems
rule

A Roadmap to Reducing IT Complexity
A major study by IDG Research in June of 2009 found clear evidence that IT complexity has become public enemy #1 among information managers. Complexity stifles innovation, drives up costs, and retards agility. And the top choice among IT managers by far for reducing IT complexity is virtualization. The IDG eZine A Roadmap to Reducing IT Complexity and the many resources it contains will help guide you to a simpler yet far more powerful IT environment.

Download this eZine now!

rule

Spotlight Story
802.11n pioneer sets 'wicked fast' expectations for wireless

With the IEEE poised to finalize the 802.11n standard, we checked in with 802.11n pioneer Morrisville State College, whose pervasive Wi-Fi network is redefining user expectations about what 'fast' means. Read full story

Related News:

News podcast: Network World 360
Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic. Also, Verizon says it opposes the sale of Nortel's enterprise business to Avaya, because the carrier fears its support contracts will end and cut off key customers. (6:34)

Windows autorun may autoinfect
Nothing beats a USB port for convenience, whether you want to quickly transport a couple gigabytes of files for work, refresh the lineup on your MP3 player, or view the pictures from your recent trip to Boise.

Steganography meets VoIP in hacker world
Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic.

Timeline: 802.11n development milestones
Today the IEEE is expected to approve the 802.11n high-throughput wireless LAN standard, capping seven years of work.

Analyst: AT&T likely to keep iPhone exclusive deal
Despite widespread speculation that Apple Inc. will open the iPhone exclusive arrangement with AT&T Inc. to include Verizon Wireless after 2010, one analyst firm is predicting that AT&T's deal as the sole wireless carrier will be extended beyond then.

Laptop Sweet Spot: 12 Winners That Cost $650 or Less
Need more PC punch than a netbook but less than a top-of-the-line desktop replacement? Here's a clutch of laptops that will get the job done.

Sears forced to destroy spyware-gathered information
As part of its final settlement with the Federal Trade Commission, Sears must destroy any consumer information it collected through a downloadable software application the FTC deemed spyware.  

Top 5 best practices for firewall administrators
Summer vacation is over and the busy holiday season is just a few months away -- not just for you, but for hackers as well. They plan to take advantage of your time off and the relaxed holiday atmosphere at Christmas and New Year's. Michael Hamelin, chief security architect at Tufin Technologies, says don't let your guard down. He provides his top 5 best practices for managing your firewall.

Wi-Fi to fill mobile WAN gaps
As AT&T prepares yet again to upgrade its HSPA 7.2 3G access and backhaul networks in the United States, the word is that some mobile network operators will eventually look to offload some of their spiraling mobile data traffic onto Wi-Fi networks. It's not clear just yet exactly what kind of experience such a move would deliver to users.

High-capacity satellite system zips voice, data, video to aircraft
A satellite system that will let the military send large amounts of voice, data, imagery and video to and from ground stations and aircraft has successfully completed tests designed to prove the systems integrity and usefulness.

Twitter: Your 'tweets' belong to you
Twitter has modified the terms of service that govern the proper user of the microblogging and social-networking site to state unequivocally that messages posted belong to their authors and not to the company.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


The history of steganography
SteganographyThere is a wealth of methods for creating encrypted messages you can't even tell are there.

Top 10 cool satellite projects
SatellitesSatellites are, by their very definition, cool.

Do More with Less Thru Netcool?
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Learn More


3 Strategies to Improve Efficiency in App Mgmt.
Change your approach to network management and you will improve network performance and reduce costs. Join us for this Live Webcast on Wednesday, September 23, 2009 at 1:00 p.m. EST/10:00 a.m. PST for all of the details. Network World Editor-in-Chief John Dix will moderate the panel that includes EMA analyst Jim Frey and Dan Klimke, Fluke Networks.
Register today.

 

September 11, 2009

TOP STORIES | MOST DUGG STORIES

  1. Linux driver chief calls out Microsoft over code submission
  2. 'Wiretapping' charges may be the silliest ever recorded
  3. Developer denies software to beat Chinese censors is malicious
  4. Top 10 cool satellite projects
  5. 802.11n demands special considerations
  6. HP puts the net pedal to the metal
  7. How to make yourself layoff-proof
  8. No alternative to Microsoft Office? IBM begs to differ
  9. Verizon protests Avaya's potential Nortel enterprise business buy
  10. The history of steganography

Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.
Learn More



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: