Problem solve

Get help with specific problems with your technologies, process and projects.

Problem solve

Get help with specific problems with your technologies, process and projects.

  • Managing mobile operators: Giving a passing grade

    Everyone likes to gripe about their wireless operators, complaining that they pay too much for services that aren't quite what they want. Many a corporate telecom department has weighed in with its own set of opinions about the things that are wrong... Continue Reading

  • Near-field communications: The next small thing

    Near-field communications, a short-range wireless connectivity standard, is designed to work over a distance of just a few centimeters or so. In this column, Craig Mathias discusses its potential. Continue Reading

  • The Pocket PC -- really

    The physical attributes of mobile devices are particularly important to mobile road warriors. In this tip, Craig Mathias discusses the possibilities of having a fully functional PC but with a PDA form factor. Continue Reading

  • 3G devices: Don't get tied down with tethering

    More and more mobile devices are appearing on the marketplace with 3G capabilities. But the impacts of broadband wireless are far and wide, and anyone interested in taking advantage of new smartphones and faster networks should be aware of both the ... Continue Reading

  • The mobile power challenge

    Mobile devices are power-hungry and the fundamental need to continue to improve both power-to-weight and absolute capacity, as well as a desire to lower recharge times, have resulted in a number of advances in battery research. Continue Reading

  • In-building wireless, Part 1: Making the case

    Poor on-campus cellular coverage is a common problem. Dropped calls, weak signals and workers standing by the nearest window are commonplace in many businesses. Given this challenge, the question is what role the enterprise IT department should play...Continue Reading

  • In-building wireless, Part 2: Best practices

    In this tip, Daniel Taylor discuss best practices around design objectives, budgeting, architecture and planning in-building wireless.Continue Reading

  • Laptop crypto: Do it, but realize it's not a panacea

    Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy.Continue Reading

  • Mobile VPN roadtest

    Mobile VPNs let users keep the same virtual IP address when roaming from hot spot to cellular to office, preserving application and login state. In this tip, Phifer explores the business problems addressed by Mobile VPNs and shares her experience ...Continue Reading

  • Extend notebook battery life by managing power consumption

    If you're not happy with the power-management software provided by your notebook maker or by what's provided in Windows by default, a program called SpeedswitchXP might help fit the bill.Continue Reading

  • The Era of Infocentricity

    Craig Mathias says the rise of mobility has taught us to rethink IT to the extent of redefining what a computer is. The benefits of this are enormous and define what he terms the Era of Infocentricity. Say goodbye to the compu- and ...Continue Reading

  • What to do when a laptop is lost or stolen

    There are a few key steps to take if one of your corporate laptops is lost or stolen. These measures will help you respond rather than react, and they will get you back on the road to recovery, minimizing any future worries.Continue Reading

  • Case Study: Mobilizing the Dutch Rail

    With 10,000 devices in the field, spread across 50 train stations, the case study for mobile applications deployment at Nederlandse Spoorwegen (Dutch Rail) is an excellent example of a strategic investment in mobile technologies.Continue Reading

  • Airline security: Checking your laptop

    Recent events have airlines issuing new rules governing carry-on items. New mandates now force us to check our laptops as baggage. Here, Craig Mathias looks at some things we need to be aware of before we check our laptops and what we need to do to ...Continue Reading

  • Mobile VPN: Closing the gap

    PDA VPN clients have been around for nearly as long as PDAs themselves. From the simple PPTP client found in early Windows HPCs to standard IPsec clients embedded in today's Symbian and Windows Mobile smartphones, solutions abound for tunneling from...Continue Reading

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close