(From our archives) They said the iPhone would be a flop

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Convergence/VoIP Alert

Dec 12, 2016
Featured Image

Common security mistakes in collaboration tools

Collaboration tools have become all the rage, but has your IT department closed all security gaps. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

(From our archives) They said the iPhone would be a flop
US mulls rules for airlines that plan in-flight Wi-Fi voice calls
How to be a CTO in the age of digital disruption (and live to tell about it)
New products of the week 12.12.16
(From our archives) High tech helps solve mystery of ancient calculator
iPhone power plug knock-offs are a fire hazard

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Thumbnail Image

(From our archives) They said the iPhone would be a flop

Pundits who got it wrong explain why ... or deny that they did Read More

Thumbnail Image

US mulls rules for airlines that plan in-flight Wi-Fi voice calls

The U.S. Department of Transportation is considering making it mandatory for airlines to inform passengers before purchasing tickets if they will allow voice calls using mobile wireless devices on board their aircraft, thus hoping to placate customers who could object to having co-passengers talking away on their phones in an enclosed space. Read More

Thumbnail Image

How to be a CTO in the age of digital disruption (and live to tell about it)

There are many ways for for modern CTOs to ensure they're forging the right path for their team and company. Start by asking the right questions. Read More

Thumbnail Image

New products of the week 12.12.16

Our roundup of intriguing new products from companies such as Aruba and Red Hat. Read More

(From our archives) High tech helps solve mystery of ancient calculator

Results of a high-tech research project to be released next week promise to finally unravel much of the remaining mystery of a 2,000-year-old astronomical calculator. Read More

Thumbnail Image

iPhone power plug knock-offs are a fire hazard

Virtually none of the third-party Apple iPhone chargers meets safety standards. Consumers should buy from only trusted suppliers. Read More

Video/Webcast: Keeper Security

How to Protect Your SMB Against Cyber Attacks

Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. AT&T to cough up $88M for ‘cramming’ mobile customer bills
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
5. Cisco Talos: Zeus spawn “Floki bot” malware gaining use cyber underworld notoriety
6. 19 free cloud storage options
7. Just one autonomous car will use 4,000 GB of data/day
8. 10 reasons to divorce the cloud
9. 10 most useful Slack bots
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Convergence/VoIP Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.