Americas

  • United States

NetFlash: Cell tower camouflage artists just want to blend in

Opinion
Feb 04, 20042 mins
Networking

Quick: What do flagpoles, cacti, trees and church steeples have in common? That’s right, they could all be cell towers and you wouldn’t know it. Everyone wants cell phone service, but no one wants a 100-foot concrete monstrosity in his or her backyard. That’s where cell tower artists come in, with a different kind of “network architecture.” Take a look at their world in this week’s A Wider Net. Cell tower camouflage artists just want to blend in http://www.nwfusion.com/news/2004/0202widernetcelltowers.html?net

Quick: What do flagpoles, cacti, trees and church steeples have in common? That’s right, they could all be cell towers and you wouldn’t know it. Everyone wants cell phone service, but no one wants a 100-foot concrete monstrosity in his or her backyard. That’s where cell tower artists come in, with a different kind of “network architecture.” Take a look at their world in this week’s A Wider Net.

Cell tower camouflage artists just want to blend in

https://www.nwfusion.com/news/2004/0202widernetcelltowers.html?net

Cisco Q2 beats estimates

Cisco’s business is on an upswing, with sales up 14.5% over last year, and up 5.8% over the previous quarter. Fueling the business are switches – which accounted to 39% of sales, vs. the 26% earned by routers.

https://www.nwfusion.com/news/2004/0203cisearn.html?net

VoiceXML edges closer to standard status

The VoiceXML 2.0 specification has been granted Proposed Recommendation status by the World Wide Web Consortium, and is therefore only one step away from becoming an official W3C standard, the VoiceXML Forum said in a statement Tuesday.

https://www.nwfusion.com/news/2004/0203voiceedges.html?net

The evolution of application layer firewalls

First there were packet filters. Then stateful inspection firewalls; then intrusion detection. Now the latest Internet defense technology – deep packet inspection firewalls – is being touted as the best line of defense against worms that can sneak past earlier technology to wreak havoc in corporate networks.