Search This Blog

Monday, July 30, 2012

3 ways to add broadband to your mobile devices

The hidden iPhone: New photos from early 2006 show Apple's design tinkering | Android news and rumor round-up for week ending July 27

Network World Wireless

Forward this to a Friend >>>


3 ways to add broadband to your mobile devices
Smartphone users have gotten used to having 3G/4G connectivity whenever they're away from a Wi-Fi network. However, if you're using a tablet or a laptop, that's often a different story. Read More


WHITE PAPER: Citrix Systems

9 Reasons Why Citrix NetScaler Beats F5
Citrix NetScaler beats F5 and gets your network Cloud-ready by providing 2X consolidation; 5X capacity and 4X+ scalability. Learn More

WHITE PAPER: Raritan

A Quick Start to Measuring Power Use
Rule-of-thumb estimates for power consumption are no longer sufficient. Discover a quick way to establish baseline power measurements with intelligent rack power distribution units (iPDUs) to meter the power and wireless sensors communicating that information, and eliminate the need for Ethernet connections to iPDUs. Learn More

The hidden iPhone: New photos from early 2006 show Apple's design tinkering
Even as iPhone 5 fever heats up, Apple-Samsung court case puts focus on original iPhone Read More

Android news and rumor round-up for week ending July 27
People just love the Nexus 7. Love it down to its grippy white back panel. And that's actually causing problems. Read More

iPhone 5 rumor rollup for the week ending July 27
The iOSphere roiled over September hopes, and The Rollup contributes its own exclusive rumor from a Trusted Source, natch. Read More


WHITE PAPER: F5

Application Delivery Optimization
Fueled by users who are hyper-sensitive to delays in application delivery, organizations are striving to improve performance by optimizing delivery. Learn how to achieve that goal without sacrificing the agility of modern data center architectures. Learn More!

Researcher wows Black Hat with NFC-based smartphone hacking demo
At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC) capability in the smartphones. Read More

INSIDER
How to become a BYOD guru
Becoming a BYOD guru isn't an overnight proposition -- it's something that takes initiative, persistence and time. We've identified five key resource areas that can help you master the technical, legal and security ramifications of BYOD and maintain a pipeline of information once you've rolled out your own program. Read More

Olympic gold: 15 free iOS and Android apps
Watch live, keep up with the athletes, test your knowledge of the games and more Read More


WHITE PAPER: IBM

Microsoft Dynamics AX solutions from IBM
IBM provides consulting, implementation and application management services for Microsoft Dynamics AX, a comprehensive ERP solution for midsize and larger organizations that empowers people to work effectively, manage change, and compete globally. Learn More.

Standards bodies launch oneM2M service layer for Internet of Things
A consortium of ICT standards development bodies has set up a new global organisation to ensure the efficient deployment of machine-to-machine (M2M) communications systems. Read More

Apple security guru lays out iPad, iPhone crypto architecture at Black Hat
A top Apple security guru Thursday presented an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets, underscoring the complex certificate-based encryption framework Apple has adopted. Read More

Wi-Fi and 3G hubs banned from Olympics
Personal or private wireless access points and 3G hubs are not allowed at London Olympics events and venues, but iPhones, iPads and Android smartphones and tablets are OK. Read More

Quirkiest Moments at 2012 Black Hat security conference
From half-naked booth reps to colorful robots, it wasn't all about security on the exhibit floor and around the conference Read More



SLIDESHOWS

18 Notable Apple Alumni
While some with Apple ties are already well-known, others may be surprising to find on the list.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. The day VMware ate Cisco
  2. The 5 hottest IT jobs right now
  3. Windows 8 is a 'catastrophe,' says Valve founder and former Microsoft employee Gabe Newell
  4. Quirkiest moments at 2012 Black Hat security conference
  5. Black Hat: Shark-bitten security researcher takes another chomp out of Oracle database
  6. Researcher wows Black Hat with NFC-based smartphone hacking demo
  7. Google Talk users lash out over major outage
  8. Cisco layoffs this week part of 'Transformation Project'
  9. Earliest known photos of an Apple iPad prototype
  10. Tatu Ylonen, father of SSH, says security is 'getting worse'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: