Wednesday, September 17, 2014

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?

The iPhone 6 and iPhone 6 Plus Quiz | Researchers' new app outs iPhone and Android phone energy hogs

Network World Mobile & Wireless

Is a Remote-Wipe Policy a Crude Approach to BYOD Security?
While the capability to remotely wipe data from lost or stolen mobile phones may help CIOs sleep at night, it may be an outdated approach to BYOD security. Read More


: Samsung

Is your smartphone secure enough?
Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more. Learn More

In this Issue


WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

The iPhone 6 and iPhone 6 Plus Quiz
The new Apple phones are all anyone's talking about but how well do you really know them? Read More

Researchers' new app outs iPhone and Android phone energy hogs
Researchers from the United States and Sweden have launched a free iOS and Android smartphone and tablet app that singles out which ones take the biggest toll on your device batteries and also illustrates fragmentation of Apple and Android mobile OSes. Read More

Subway to accept NFC payments starting in October
The sandwich chain will roll out contactless payments at 26,000 restaurants Read More

Apple locks NFC chip to Apple Pay while PayPal fires shot at security
Third parties won't have access to the new iPhone models' NFC capabilities, perhaps due to security reasons. Read More


WHITE PAPER: Netscout Systems Inc.

The Role Network Visibility Plays in Application Delivery
In this report, EMA examines the value of a network-based application-aware performance management strategy that provides depth and top-down troubleshooting, as well as business-relevant, real-time insights for converged operations monitoring and support. Learn More

Many Android devices vulnerable to session hijacking through the default browser
The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy Read More

In memoriam: Apple's iPod through the years
In the wake of Apple's recent decision to retired the iPod Classic, let's take a look back at the progression of the device that changed the music industry. Read More

Intel teams with Indian firm to launch 'Eddy' tablet for children
Eddy holds out the promise of keeping children away from TVs and smartphones Read More

Brocade buys NFV mobile analytics assets
Vistapointe software virtualizes probes for mobile network operators Read More


WHITE PAPER: Citrix Systems

Defend Web Properties with Citrix NetScaler
Today, defending your organization's web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today's modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution. Learn more

Samsung's first open-source conference kicks off, with Tizen on its mind
The inaugural Samsung Open-Source Conference opens Tuesday morning in Seoul, with keynotes from well-known figures in the open source world and a hackathon focused on Tizen, the company's in-house mobile operating system. Read More

How Google is helping me live a cellphone-free life
Two recent Google Hangout announcements will make it easier to live my cellphone-free life, without relying on Skype. Read More

Windows 9 leak shows Storage Sense and Wi-Fi Sense coming over from Windows Phone
The next version of Windows could make it easier to get online and clear up storage space. Read More

iPhone 6 pre-orders set all-time record at 4 million
Apple today announced that pre-orders for the iPhone 6 and iPhone 6 Plus checked in at 4 million after just 24 hours. Read More

6 Tips for Replacing Your Windows Laptop With a Surface Pro 3
Planning to ditch your laptop for a Windows tablet such as the Surface Pro 3? These tips will help you set up, secure and make the most of your new device. Read More

A wireless router may someday charge your mobile devices
Energous has developed a WiFi-style wireless charging device that sends power to anything within a 30-foot radius. Read More


SLIDESHOWS

Sneak Peek: New features coming to Internet Explorer

Microsoft's new Developer Channel offers glimpse into upcoming features of IE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Internet of Overwhelming Things

2. Cisco gains strength in next-gen firewalls via Sourcefire

3. Is SWAT raid on wrong house, based on open Wi-Fi IP address, unconstitutional?

4. What would you do if you lost access to your Gmail account?

5. How network virtualization is used as a security tool

6. IBM cuts pay by 10% for workers picked for training

7. Microsoft sets Windows 9 reveal for Sept. 30

8. How Google is helping me live a cellphone-free life

9. Top IT vendors reveal their IoT strategies

10. Sneak Peek: New features coming to Internet Explorer


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: