Wednesday, February 12, 2014

Gigabit Wi-Fi Case Study: Erickson Living upgrades to 802.11ac

iPhone 6 rumor rollup for the week ending Feb. 7 | Hot new products of the week 2.10.14

Network World Mobile & Wireless

Forward this to a Friend >>>


Gigabit Wi-Fi Case Study: Erickson Living upgrades to 802.11ac
Erickson Living, a company that manages 16 Continuing Care Retirement Communities in nine states, faces a unique challenge when it comes to installed a wireless network – each retirement community has common areas where residents share available bandwidth, but there are also individual residential units where end users have their personal phone and Internet connections. Read More


WHITE PAPER: Dell Software

Nightmare on Delegation Street with Native AD Tools
Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you're using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever. Read now!

WHITE PAPER: Dell Software

SuperMassive Series data sheet
Learn how to protect against today's emerging threats in this SuperMassive NGFW datasheet. Read now!

iPhone 6 rumor rollup for the week ending Feb. 7
A "new rumor" in the iOSphere is almost a contradiction in terms. More typically, a current rumor regurgitates an earlier rumor and, paradoxically, gets additional not less credibility for doing so. Read More

Hot new products of the week 2.10.14
Our roundup of intriguing new products from companies such as Microsoft and Sophos Read More

LA building's lights interfere with cellular network, FCC says
When a certain Los Angeles office building lights up, it's a dark day for nearby cellphone users, according to the U.S. Federal Communications Commission. Read More


WHITE PAPER: Dell Software

Managing Risk in an Active Directory
Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment. Read now!

Broadcom aims to power fast LTE smartphones for less than US$300
This year's Mobile World Congress will see an LTE that's more mature than ever, with higher speeds, more device selection and more chip suppliers adding to the range of options for the fast mobile technology. Read More

INSIDER
5 biggest mistakes of IT hiring managers
As IT hiring ramps up in 2014, many job market experts are predicting a tech talent shortage. And certainly among the hot skill sets – security, Big Data, .NET and Java developers, project managers, business analysts and anyone with cloud or mobile experience – you can expect to see some sort of talent war, says Matthew Ripaldi, senior vice-president at Modis, a global provider of IT staffing services. Read More

16 weirdest places you'll find Linux
Linux is everywhere, if you look for it. Read More


WHITE PAPER: Dell Software

Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

SDN start-up Big Switch bullish on new course
SDN start-up Big Switch Networks is ready to embark on a new chapter after rebooting its business late last summer. Read More

6 tips for smartphone privacy and security
In the digital world, things are getting worse rather than improving with regard to the populist quest for personal privacy and security. Our smartphones track wherever we go, what we say, who we say it to, our likes and dislikes, and when we are playing games instead of working. Our computers track and record the same types of information day in and day out. Read More

Fragmented wireless charging field thins as organizations unite
Two rival consortiums defining wireless power standards have merged specifications, narrowing the field of organizations competing to define how mobile devices are charged when they are not plugged into power outlets. Read More

Snapchat vulnerability can be exploited to crash iPhones, researcher says
A vulnerability in Snapchat allows attackers to launch denial-of-service attacks against users of the popular photo messaging app, causing their phones to become unresponsive and even crash. Read More


SLIDESHOWS

Steve Ballmer's retirement plans

The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 16 weirdest places you'll find Linux

2. FIRST LOOK: HP takes giant leap in server design

3. Apple's iBeacon turns location sensing inside out

4. Cyberespionage operation 'The Mask' compromised organizations in 30-plus countries

5. Inside the network powering the Sochi Olympics

6. DARPA seeks the Holy Grail of search engines

7. Satellite hotspot promises to bring Wi-Fi everywhere

8. Apple has 200 people working on iWatch, report claims

9. Bill Gates tells Reddit he'll target cloud, Windows and Office in his new role at Microsoft

10. Microsoft offers multifactor authentication to all Office 365 users


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: