Going wireless -- gradually
Network adapters without WPA
Option to disable SSID
Bluetooth frequency-hopping techniques
Implementing mesh networking using 802.15.4
Monitoring WLAN coverage within steel/metallic superstructure buildings
Sales department dilemma: Smartphones or PDAs?
Wide area Wi-Fi
Will my 802.11 access point interoperate with 802.11b?
Achieving blanket WLAN coverage on a university campus
RFID manufacturers and suppliers
RFID and consumer privacy concerns
Security risks of Wi-Fi enabled PDAs
Tim Scannell's mobile management predictions for 2004
Lisa Phifer's wireless predictions for 2004
Kevin Beaver's mobile security predictions for 2004
The 802.15.3 wireless specification
Wireless design considerations for a nine-floor office building
Updating data outside the office
All about 3G
The latest in wireless security
Backing up contact data from a mobile phone
Moore's Law and handsets
Who provides mobile devices for the enterprise market?
What will drive the adoption of smartphones?
Future functionalities for handsets
Configuration crisis: Wireless PCI card will not access network properly
Enterprise-class wireless security on the cheap
Wireless security audits for WLANs and BlackBerrys
Accessing secure sites through a wireless router
"Quick and dirty" options for measuring throughput
Sharing wireless connections without PCI cards or APs
Arguing for open ports
Antivirus software for corporate PDAs
Web address filtering
Wireless Internet at Disney World and other destinations
Developing for wireless devices
Implementing a WLAN across three floors of an office building
Sharing printers through a wireless router
Memory/storage allocation problems
Connecting an Ashton Digital Passport 2100 computer to a satellite dish
Running PDAs on Macs
Choosing between different security options for wireless networks
The most popular flavor of 802.11
Bluetooth SD card for Palm OS 5
The future of Linux in the mobile phone industry
Considering a Toshiba PDA with a compact flash slot
Looking for a PDA with a Firewire input
Confusion about 802.1x authentication methods
The difference between an access point and a router
Analog Microwave Radio and Digital Microwave Radio
What kind of systems use the CSMA protocol?
Choosing wireless routers
How secure are GSM networks?
Smartphones and malware
Dynamic addresses for mobile networks
VSAT for Internet connectivity
Convergence of CDMA and GSM
Is it worthwhile to look at Bluetooth for the office?
Wi-Fi vs. 3G
Benefits of UWB
Security and UWB
Will Toshiba come out with a Centrino Tablet PC?
Security issues for tablet PCs
Mobile CRM application for the Palm platform
Features of a wireless router
CDPD wireless service providers: Is this the end?
Extending the range of a wireless router
Can I push a policy ACL onto a Pocket PC
Biometrics for PDA security
802.1x for WLAN security
Making the 802.11s work together
Connecting small networks
Do PDAs have spell checker?
What is Bluetooth?
What is mobile computing?
Eliminating the risk of spoofing
Creating a mobile application testbed
What is difference between FCC and IEEE, and between IEEE and ETSI?
Infrared ports and security
How do you pronounce UNII?
What is RSSI?
Troubleshooting wireless connection
Sharing wireless connections
Wi-Fi routers vs. hot spots
Wi-Fi vs. Bluetooth
Create a Wi-Fi network with your neighbors
Can I connect a SOHOware NBG 800 broadguard wired router with a D-Link 614+ wireless router
Neighboring wireless LANs
Battery monitors for Pocket PC-based devices
Rogue access points
AES encryption and WPA
802.11i product releases
Signal fluctuations and heat problems in CDMA-based handsets
Ad hoc connections
Wi-Fi for wide area networking
Distribution of traffic capacity among users connected to an access point