- Tutorial: How to fix app store errors in Windows 8
- How to fix the two-factor authentication log-in error in Gmail on Android
- 10 open source e-learning projects to watch
- Connected vehicle tech trial to start trucking on in NSW
Wi-Fi in pictures
In this Network World Digital Spotlight, "Harnessing Gigabit Wi-Fi," we do a deep dive on the latest Wi-Fi developments.
By John Dix | 17 April, 2014 05:05
Meru Networks has announced two new dual-stream, enterprise 802.11ac access points, including one designed to replace an Ethernet wall plate.
By John Cox | 05 April, 2014 00:12
I'm a big fan of working at offsite locations--meaning my local Wi-Fi-equipped coffee shop. In fact, I'll often spend the afternoon hunkered down at Panera Bread, iced tea in one hand and a French Toast bagel in the other. (It's bad form to set up shop without buying something.)
By Rick Broida | 29 July, 2010 08:22
Hair-pullingly bad experiences with wireless networking have led me to formulate Snyder's First Law of Home Networking: No matter who sells you the router, you'll have at least one excruciating session with tech support before you have an Internet connection.
By Bill Snyder | 11 May, 2010 07:06
Google Latitude is a useful--if slightly creepy--way to track your location on a mobile phone or GPS laptop. But you can get roughly the same sense of fleeting privacy on any old Wi-Fi PC; Google Latitude automatically pegged me within about 100 feet of my ground-floor office on GPS-free laptop.
By Zack Stern | 12 February, 2009 07:10
Gibbs ponders how a Starbucks coffee cup could become the greatest business edge
By Mark Gibbs | 18 January, 2013 15:16
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
By Jeff Bertolucci | 29 May, 2010 00:31
Whitepapers about Wi-Fi
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise. Read on.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTContent StrategistNSW
- FTDeliverability SpecialistNSW
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
- Apple kicks off public OS X beta testing
- It's the little things that matter in Amazon Redshift upgrade
- Google AdWords cleared in geotagging patent lawsuit
- China's Xiaomi targets ten markets in international expansion
- Toshiba, SanDisk NAND flash memory shrinks to 15-nanometer process
- Bing for schools out of pilot stage, promises ad-free search
- NSA spying revelations have tired out China's Huawei
- Brazil's senate passes Internet legislation ahead of NETmundial conference
- US to vote on sharp increase in broadband subsidies
- Coding error protects some Android apps from Heartbleed
- Optus Satellite extends NZ market reach with Wireless Nation deal
- Dorian Nakamoto thanks Bitcoin users for donations
- While Heartbleed distracts, hackers hit US universities
- Should Australians prepare for rubber-hose cryptanalysis?
- Violin and Microsoft play a duet to speed up applications