Wednesday, December 17, 2014

How to secure Apple and Android mobile devices using 802.1X

  The year in tech industry apologies | Apple-IBM partnership off to 'impressive' start

 
  Network World Mobile & Wireless  

 

INSIDER
How to secure Apple and Android mobile devices using 802.1X
Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network. Read More

 


WEBCAST: Alcatel-Lucent Enterprise

Best Practices in Transforming a Legacy Network
The explosion of mobile device use is testing the limits of legacy networks everywhere. In this webcast you will learn how Abilene Christian University meets the mobile access demands of 4500 University students, and 250,000 connections per day. Learn More

WHITE PAPER: PC Connection | Acer

Acer Playbook: Proven Solutions for Professional Demands
Whether your workforce requires high-tech mobility, powerful desktops to streamline efficiency, reliable technology available 24 x 7, or competent tools for viewing and projecting, you'll find your solution in Acer notebooks, desktops, servers, monitors, and projectors. Learn More

The year in tech industry apologies
SorryImage by Flickr/ Neil SloranceTo read this article in full or to leave a comment, please click here Read More
 

Apple-IBM partnership off to 'impressive' start
  Apple and IBM kicked off their five-month-old partnership with an "impressive" 10-pack of focused mobile business apps catering to sectors ranging from financial to law enforcement. Read More
 

Big new United Airlines carry-on item: iPhone 6 phablets for 2,300 flight attendants
  United Airlines this week announced that its flight attendants will soon be equipped with Apple's iPhone 6 Plus phablets to take care of your safety, food and entertainment needs. Read More
 


WHITE PAPER: IBM

Forrester 2014 Dynamic Case Management Wave
Forrester has released its 2014 Dynamic Case Management Wave, and for the second consecutive time, IBM is a leader. View Now>>

IDG Contributor Network: Wi-Fi most important hotel feature, survey says
I'm going to age myself here by recalling for you the days and nights I have spent crawling around under hotel beds attempting to hack phone jacks. That grubby activity was in order to connect my then-glamorous 1989-launched Sharp Wizard PDA, or Personal Data Assistant.This scrabbling and dubious-sounding enterprise was so that I could access pre-web CompuServe, the first major commercial online service. I used it to read home news in the room. It was a pursuit that was otherwise unattainable in those days.The alligator clips, a number of fried modems—digital switchboards introduced around then killed modems—and an acoustic coupler, along with the Wizard itself, have long been assigned to the computer dump in the sky. Ah, fond memories.To read this article in full or to leave a comment, please click here Read More
 

7 devices that make your data vulnerable
Deadly IoT devicesFirst popularized in the late 1990s, the idea of connecting home appliances to the Internet to facilitate grocery shopping was seen as the next big thing. As the Internet and wireless technology caught up to the idea and gained mainstream acceptance, consumers started adopting IoT technologies for everything from fitness to writing implements. While there are many threat vectors in today's IoT landscape, we decided to look at seven deadly "devices" that could someday cost a company millions in data loss.To read this article in full or to leave a comment, please click here Read More
 

Why Comcast's pro-net neutrality ads are totally disingenuous
The giant cable company and ISP is running commercials claiming to support the "Open Internet." Don't believe it for a second. Read More
 


WHITE PAPER: Curvature

Whitepaper: Peers vs. Policy
Companies are interested in a single point of contact, on-site vendor support, more comprehensive network knowledge, and support for end-of-life products. To keep up with these evolving requirements, IT decision makers are considering peer advice and alternative maintenance. View now

12 most eye-popping VC tech deals of 2014
While the three largest venture capital deals of the year in the technology industry went to consumer-focused startups, most of the other top investments went to companies building products that could reshape the enterprise IT landscape. Read More
 

Was 2014 the beginning of the end for Samsung?
At the beginning of 2014, I predicted that Samsung's smartphone dominance would start to ebb. It looks like I was right. Read More
 

The best office apps for Android
Which office package provides the best productivity experience on Android? We put the leading contenders to the test Read More
 

Walmart slashes iPhone 6, iPhone 6 Plus prices
  The new Apple iPhone 6 Plus phablet was nowhere to be found among all the blockbuster Black Friday and Cyber Monday deals last month, but Walmart has surprised this week by announcing a deep discount on the smartphones through February. Read More
 

 

SLIDESHOWS

A brief history of Linux malware

A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco becomes a Big Data analytics provider with 'mist' computing

2. Riverbed goes private in $3.6 billion deal

3. Hackers to Sony staff: Email us to keep your secrets private

4. Microsoft gets allies to help tell US to back off on Irish search warrant

5. Illinois hospital reports data blackmail

6. How to secure Apple and Android mobile devices using 802.1X

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. The best office apps for Android

9. Sony hackers release more data, promise 'Christmas gift'

10. Was 2014 the beginning of the end for Samsung?


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_wireless_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: