Many U.S. residents who have written the FCC to voice concerns about the move from copper-based telephone networks to Internet Protocol are concerned about the potential effects on health from mobile-headset radiation and what happens when the electricity goes out.
By Grant Gross | 17 April, 2014 04:23
Review: Plantronics Voyager Legend CS Bluetooth Headset System and Logitech Mobile Speakerphone P710e
Here are two new devices that can help improve audio quality for voice calls, whether you're in the office or out on the road.
By Keith Shaw | 25 November, 2013 10:43
Yep, I've been writing for Network World for 20 years and a lot has happened in that time ... here are 10 of the most surprising
By Mark Gibbs | 03 June, 2013 07:15
The scoop: Logitech Wireless Headset Dual H820e, by Logitech, about $200 (mono version costs about $180).
By Keith Shaw | 31 May, 2013 18:05
Shaw reviews Das Keyboard's latest high-performance mechanical keyboard and AccessoryPower.com's GOgroove BlueSYNC SRC Portable Bluetooth Speaker and Receiver.
By Keith Shaw | 16 May, 2013 20:07
Facebook's big announcement was a big "so what?" and minimal innovation at its finest
By Mark Gibbs | 05 April, 2013 14:11
Shaw reviews Roku's Roku 3 Internet streaming TV box and Jabra's Revo wireless headphones.
By Keith Shaw | 25 March, 2013 12:07
Twit Cleaner is a popular web app that has been used by hundreds of thousands of Twitter users to clear deadwood from their accounts.
By Paul McNamara | 25 March, 2013 06:16
A group of my colleagues from different offices recently attempted a multi-party videoconference, brutally showing the continued need for a better method of video communication.
By Keith Shaw | 13 March, 2013 15:01
Gibbs analyzes the results of his "How do you manage your social networks?" survey
By Mark Gibbs | 28 February, 2013 20:10
OK, lots of interesting stuff for you this week. First up, LinkedIn has open sourced a system called Databus, a real-time database change capture system that provides a "timeline-consistent stream of change capture events ... grouped in transactions, in source commit order."
By Mark Gibbs | 27 February, 2013 15:25
For my recent column of predictions for 2013 I polled a huge number of IT people to see what they are expecting, and ended up getting more than 400 responses.
By Mark Gibbs | 15 February, 2013 23:19
Shaw reviews Western Digital's WD TV Play, by Western Digital.
By Keith Shaw | 12 February, 2013 14:13
Gibbs reviews his predictions from last year and surveys the more than 400 predictions that he's been sent by IT professionals
By Mark Gibbs | 02 January, 2013 17:04
Software-defined networking (SDN) has the potential to transform the telecom industry by improving the ability of carriers (both wired and wireless) to flexibly deliver bandwidth "on demand." It is critical that carriers improve both their network flexibility (improved customer value) and reduce their high operational costs as over-the-top providers (e.g., Google, Amazon, Skype, etc.) challenge the carriers' ability to grow their revenues and impact their margins.
By Lee Doyle, principal analyst at Doyle Research | 11 December, 2012 20:17
Shaw reviews Brother's OmniJoin Web and videoconferencing service.
By Keith Shaw | 03 December, 2012 11:59
That there is nothing unusual about either of these anecdotes is what makes them so remarkable.
By Paul McNamara | 03 December, 2012 06:03
Gibbs follows up on his column from two weeks ago wherein he claimed " I think I know just what might be the smart [social media] tubes of the future.
If there's one thing that chaps everyone's butt it's how the cellphone carriers seem to just keep grinding away to extract a few extra cents from their customers through bogus charges and ridiculous limitations.
On July 2 this year a manifesto appeared called the "Declaration of Internet Freedom," which you can find at internetdeclaration.org/ (I quote the URL for reasons that will be clear in a minute).
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTOBIEE BI/DW ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTIT Support EngineerNSW
- FTContent StrategistNSW
- FTDeliverability SpecialistNSW
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system