Wednesday, October 2, 2013

Is that hotspot safe? Wi-Fi Alliance wants to help

Computerworld Networking - Newsletter - computerworld.com

  IT industry undergoing an epic transition | Cisco IOS fixes 10 denial-of-service vulnerabilities
 
 
  Computerworld Networking

Forward this to a Friend >>>


Is that hotspot safe? Wi-Fi Alliance wants to help
Security-savvy mobile-device users are increasingly casting a skeptical eye on public Wi-Fi, and now the vendor consortium behind the wireless standard wants to make logging in via that coffee shop network a bit safer. Read More
 


RESOURCE COMPLIMENTS OF: CITE Conference

Your pad or mine? BYOD is changing everything.
Tablets and mobile devices are driving a BYOD revolution in the enterprise. Come to Consumerization of IT in the Enterprise One-Day Forum(CITE) November 5, 2013 in New York City and learn how top IT leaders have made it work for them…and how you can, too. Learn more

WHITE PAPER: SonicWALL

10 Ways to Securely Optimize Your Network
Learn 10 ways SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. Read now.

IT industry undergoing an epic transition
CEO Michael Friedenberg reads the signs of an enterprise tech industry that is unraveling before our eyes. But as one computing era ends, a new one (which IDC calls the third platform) is just beginning. Read More
 

Cisco IOS fixes 10 denial-of-service vulnerabilities
  Cisco Systems has patched 10 vulnerabilities that could impact the availability of devices using various versions of its IOS software. Read More
 

Aruba announces cloud-based Wi-Fi management service
  Aruba Networks announced a new Aruba Central cloud-based management service for Wi-Fi networks that could be valuable to companies with branch operations, schools and mid-sized networks where IT support is scarce. Read More
 

HP opens up on SDNs
HP this week is establishing an 'open' approach to SDN intended to accelerate programmable network deployments and stimulate demand for its switches and routers. Read More
 

New Verizon broadband router supports data and voice
  Verizon Wireless today announced a new broadband router that works over its LTE network and allows voice and data connectivity for the home or small business. Read More
 


WHITE PAPER: Dell and Intel®

IDC: The Benefits of Converged Systems in SMB Environments
The motivations for adoption of converged systems are improved IT efficiency, faster time to market, and increased cost advantage. These efficiencies can be easily extended to remote offices and small and medium-sized businesses (SMBs) that need to simplify their IT operations while expanding their IT capabilities. Read now!

Intel to acquire network security firm Sensory Networks
Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications. Read More
 

Fort Disco malware is now targeting email and FTP servers
A piece of malware designed to launch brute-force password guessing attacks against websites built with popular content management systems like WordPress and Joomla has started being used to also attack email and FTP servers. Read More
 

Iran accused of hacking into U.S. Navy computers
Hackers backed by Iran have penetrated an unclassified U.S. Navy network in one of the most serious incidents of cybercrime yet by the Middle East nation, according to a report Friday. Read More
 

Update: Gartner tells IT shops that it's 'game over' for BlackBerry
Respected analyst firm Gartner is set to recommend that all BlackBerry enterprise customers find alternatives to the struggling vendor's smartphones and enterprise management software over the next six months. Read More
 

FCC wants to make carriers report cell outages in disasters
Mobile operators would have to tell the public what percentage of their cell sites were working during and after major disasters if the FCC adopts a rule it is proposing in the wake of Hurricane Sandy. Read More
 

Sharky: Another highly complex virtualization issue solved
This user in a government agency is the guinea pig for a new Citrix system, and the level-3 support pilot fish responsible for the project is pretty sure there won't be any help from levels 1 and 2. He's right. Read More
 

 

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still managed some surprises. What do you think the most important news from Apple's iPhone unveiling was?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:54 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive