- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Brisbane to Gladstone yacht race fans track progress in real time
- Glass all gone after one-day sale, Google says
Wi-Fi in pictures
In this Network World Digital Spotlight, "Harnessing Gigabit Wi-Fi," we do a deep dive on the latest Wi-Fi developments.
By John Dix | 17 April, 2014 05:05
Meru Networks has announced two new dual-stream, enterprise 802.11ac access points, including one designed to replace an Ethernet wall plate.
By John Cox | 05 April, 2014 00:12
I'm a big fan of working at offsite locations--meaning my local Wi-Fi-equipped coffee shop. In fact, I'll often spend the afternoon hunkered down at Panera Bread, iced tea in one hand and a French Toast bagel in the other. (It's bad form to set up shop without buying something.)
By Rick Broida | 29 July, 2010 08:22
Hair-pullingly bad experiences with wireless networking have led me to formulate Snyder's First Law of Home Networking: No matter who sells you the router, you'll have at least one excruciating session with tech support before you have an Internet connection.
By Bill Snyder | 11 May, 2010 07:06
Google Latitude is a useful--if slightly creepy--way to track your location on a mobile phone or GPS laptop. But you can get roughly the same sense of fleeting privacy on any old Wi-Fi PC; Google Latitude automatically pegged me within about 100 feet of my ground-floor office on GPS-free laptop.
By Zack Stern | 12 February, 2009 07:10
Gibbs ponders how a Starbucks coffee cup could become the greatest business edge
By Mark Gibbs | 18 January, 2013 15:16
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
By Jeff Bertolucci | 29 May, 2010 00:31
Whitepapers about Wi-Fi
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise. Read on.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTOBIEE BI/DW ConsultantNSW
- FTIT Support EngineerNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
Fox Sports Australia needed a way to deal with explosive data growth while moving to a new purpose-built studio and production facility. Read how an internal private broadcaster helped the broadcaster meet these challenges while savings costs, decreasing system implementation time and reducing IT support calls by 75%.
- Microsoft takes Iowa from corn to .com
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines