Author: Stojan Rančić, Urban Jurca
Hackers can exploit the KRACK attack to intercept encrypted wireless traffic and thereby steal your sensitive information, such as passwords, credit card numbers, personal information, and professional secrets, if those travel through the wireless network unencrypted.
The CWNA training is vendor-independent, practical, and covers broader wireless concepts, while it also provides the wireless administration skills that we can directly use on our equipment in our production environment.
Using NIL’s solution Storesense Expo, Microsoft will be able to further optimize the arrangement of exhibitor stands and conference events and as a result provide sponsors, visitors, and partners with firm arguments for being part of the conference.
This year we are celebrating 15 years of Wi-Fi technologies. In terms of technology, Wi-Fi is still pretty young and will probably see a lot more innovation in the coming years although it has experienced significant growth since the inception of IEEE 802.11n in 2007.
NIL was responsible for design, deployment of wired and wireless networks, and we also monitored and managed the whole network infrastructure. Result? No network downtime through the entire tournament and at all the venues.
There is a correlation between waiting in emergency departments and complications in later hospital care, therefore MEU management decided to implement an electronic whiteboard (EW) to speed up and improve patient care.