• April 25, 2006 25 Apr'06

    Mobile virus handbook

    Viruses that attack mobile devices are no longer an exception or proof of concept. In recent months multiple variations of these viruses have reinforced their attacks, revealing an unprecedented and alarming level of exposure. In this mobile virus ...  Continue Reading

  • April 20, 2006 20 Apr'06

    Mobile device management: Part I -- Decisions, decisions, decisions

    Daniel Taylor looks at five high-level decisions that IT managers need to make concerning mobile device management. The questions addressed are the same ones that IT managers frequently address as part of a larger company-wide mobility policy.  Continue Reading

  • April 19, 2006 19 Apr'06

    Understanding wireless security

    Craig Mathias, in his debut column for SearchMobileComputing.com, concedes that security is often seen as a roadblock to mobile deployment -- but it doesn't have to be. If you have end-to-end security across your entire network then wireless ...  Continue Reading

  • April 19, 2006 19 Apr'06

    Mobile field service business solutions

    In developing a case for a mobile solution in field service, this white paper discusses the business areas positively influenced by wireless job dispatch applications and the ROI developed. It identifies areas where changes may be required within a ...  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11m

    802.11m is an initiative to perform editorial maintenance, corrections, improvements, clarifications, and interpretations relevant to documentation for 802.11 family specifications.  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11k

    802.11k is a proposed standard for a series of measurement requests and reports involving channel selection, roaming, transmit power control (TPC), and subscriber statistics in 802.11 wireless local area networks (WLANs).  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11j

    The 802.11j specification is a proposed addition to the 802.11 family of standards for wireless local area networks (WLANs) that incorporates Japenese regulatory extensions to the 802.11a standard.  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11h

    The 802.11h specification is an addition to the 802.11 family of standards for wireless local area networks (WLANs). 802.11h is intended to resolve interference issues introduced by the use of 802.11a in some locations, particularly with military ...  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11g

    The 802.11g specification is a standard for wireless local area networks WLANs) that offers wireless transmission over relatively short distances at up to 54 megabits per second (Mbps), compared with the 11 Mbps theoretical maximum with the earlier ...  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11e

    802.11e is a proposed enhancement to the 802.11a and 802.11b wireless LAN (WLAN) specifications.  Continue Reading

  • April 10, 2006 10 Apr'06

    wireless

    Wireless is a term used to describe telecommunications in which electromagnetic waves (rather than some form of wire) carry the signal over part or all of the communication path.  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11d

    802.11d is a communications specification for use in countries where systems using other standards in the 802.11 family are not allowed to operate.  Continue Reading

  • April 10, 2006 10 Apr'06

    802.11b

    The 802.11b standard for wireless local area networks (WLANs) - often called Wi-Fi - is part of the 802.11 series of WLAN standards from the Institute of Electrical and Electronics Engineers (IEEE).  Continue Reading

  • April 10, 2006 10 Apr'06

    TrueCrypt reviewed: Free utility for mobile encryption

    In the mobile world the only sure way to secure sensitive data is with encryption. But any such encryption utility has to be easy to use on Windows machines. Contributor Serdar Yegulalp takes an extensive look at a free partition- and disk-level ...  Continue Reading

-ADS BY GOOGLE

SearchNetworking

SearchUnifiedCommunications

SearchSecurity

Close