Search This Blog

Monday, August 31, 2009

Prepping for (finally!) a standard 11n world

New attack cracks common Wi-Fi encryption in a minute; Microsoft's new OneApp: turning feature phones into smarterphones
Network World logo

Wireless Alert

NetworkWorld.com | Update Your Profile


Sponsored by Actuate
rule

Reporting for Profitability
Think beyond the current structure of a report and personalize it with Business Intelligence Reporting Tools (BIRT) Interactive Viewer. Meet data visualization requirements faster and with less development by making BIRT web output interactive.

Learn more.

rule

Spotlight Story
Prepping for (finally!) a standard 11n world

As the IEEE 802.11n standard approaches ratification, expected in two weeks, mainstream enterprises will become more serious about investing in the high-throughput Wi-Fi technology. Read full story

Related News:

New attack cracks common Wi-Fi encryption in a minute
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute.

Microsoft's new OneApp: turning feature phones into smarterphones
Earlier this week Microsoft unveiled some new code and a new approach that lets basic feature phones -- with limited RAM and processing power -- use a much wider array of mobile apps.

FCC to take long, hard look at wireless industry
The Federal Communications Commission approved an inquiry that could lead to sweeping changes in how the commission evaluates the wireless industry.

Cell phones can help weed out counterfeit drugs
Cell phones with a custom client and a complementary server can help third-world countries fight the flood of counterfeit or expired drugs.

Software lets cell phones write on air
Cell phones can be modified to act as pens that record messages written in the air that can then be sent as e-mails.

How to keep Big Brother from tracking cell phone
Network providers gather data that tracks where customers go with their cell phones, a potential privacy infringement that researchers are trying to eliminate.

iPhone apps: Five markets under siege
Thanks to the App Store and the iPhone's versatility, Apple's smartphone combines many different devices into one compact product. In the face of such a juggernaut, is it possible for standalone GPS devices, MP3 players, handheld games, low-end digital cameras and e-readers to survive?

Cisco downplays WLAN vulnerability
Cisco downplayed a vulnerability in some of its wireless access points, reporting Tuesday that there is no risk of data loss or interception.

Researcher plots downfall of GSM phone security
A US-based researcher has published a new method of attacking the encryption used to secure GSM mobile phones that he believes will force networks to revise the current generation of call security.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Effectively Supporting Consumer-Owned Smartphones
Resolve Smartphone downtime incidents quickly by sharpening your approach to mobile device management. In this whitepaper Osterman Research clearly explains which Smartphones are being used, how IT shops are managing these devices and how the heterogeneous nature of the market is causing more complexity for IT professionals.
Learn More


Go Green - Save Green - IT Power Management
Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.
Learn More

 

August 31, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 words you can never say in the office
  3. Robocalls outlawed as of Sept. 1
  4. 5 techs that could reinvent cell phones
  5. The opposite of Twitter
  6. High-tech blimps earning their wings
  7. Obsolete technology: 40 losers
  8. Worst co-workers ever
  9. Free tool brings analysis to Cisco ASA
  10. 2,200 broadband stimulus applications

Gartner Predicts 2009: Recession Accelerated Shifts in IT Services
Recessions have the powerful effect of accelerating shifts in the market. The need to lower cost, increase efficiency and conserve cash has increased the motivation of companies to turn to outsourcing and increased the appeal of alternative delivery models. The disruptive shifts in new demand and supply patterns will drive changes for how IT services are bought and from whom. Gartner's Strategic Planning Assumptions for the IT services market will help buyers and sellers plan their strategies.
Click here to continue.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: