Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Tablet security: Best practices for the tablet computer onslaught
Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure. Continue Reading
Mobile security for tablet devices: Recognizing risk
Tablet devices are flooding into the enterprise, disrupting IT support plans and mobile security practices. Find out the business benefits and potential risks tablet devices pose. Continue Reading
Does Microsoft Kinect have a future in the enterprise?
It may seem like just another toy, but with its sophisticated motion-sensing technologies, Microsoft Kinect may transform enterprise desktops. Continue Reading
-
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network ... Continue Reading
iOS4 mobile device management features ease enterprise anxiety
New iOS4 mobile device management capabilities in Apple iPhones, iPads and iPods are allowing IT managers to more easily control iOS4-based devices with third-party mobile device management software, along with other enterprise mobile devices. Continue Reading
Understanding the risks mobile devices pose to enterprise security
There are many ways mobile devices and remote connectivity can put your enterprise in danger. Understanding these security vulnerabilities is crucial for protecting your systems.Continue Reading
Mobile client security threats shouldn't be underestimated
Malware authors haven't overlooked mobile devices, whose growing computing power now poses an inviting target. Be aware of dangers from viruses and accidental data disclosure.Continue Reading
Mobile device integration services: Choosing a mobile operating system
To offer mobile device integration services, a solution provider must be able to recommend the right operating system for mobile devices. Depending on a customer's needs, a solution provider should be able to provide a mobile OS comparison and guide...Continue Reading
LTE service lacks support for voice and SMS messaging
Many telecommunications experts have touted the benefits of 4G Long Term Evolution (LTE) mobile cellular technology and its promise of an era of high-speed mobile broadband that will enable smooth video streaming and fast Web browsing. But what ...Continue Reading
Managing mobile device diversity
In a perfect world, your entire workforce would carry one or two well-chosen mobile devices that could be managed easily and effectively through a single platform. Unfortunately, few IT managers enjoy this luxury – most must deal with an ...Continue Reading
-
Mobile Device Manager joins Windows domains to mobile devices
Microsoft's Mobile Device Manager gives IT managers better tools and added network support to improve management of devices that run Windows Mobile 6.1.Continue Reading
Mobile security threats
Mobile security threats come in many forms, and they continue to evolve. IT needs to be prepared to handle mobile device security and protect smartphones from malware, eavesdropping, unauthorized access, theft and more. This tip outlines the mobile ...Continue Reading
Understanding mobile convergence
Mobile convergence is simply the implementation of mobile handsets and similar devices that incorporate more than one radio, with the ability to hand off a connection between these otherwise incompatible physical layers. The objective is to converge...Continue Reading
Boosting business productivity with Bluetooth
Bluetooth wireless connectivity has been creeping quietly into many of the devices that workers carry into the enterprise every day. ABI predicts that roughly half of the 1.2 billion cell phones sold this year will include Bluetooth. IMS Research ...Continue Reading
Remote user security checklist
The security of remote systems has become more critical as growing numbers of distributed workforces are removed from a controlled central network. CISSP Kevin Beaver provides a list of items to lock down on remote systems.Continue Reading
WiMAX devices
WiMAX devices will become more readily available as carriers deploy widespread WiMAX service.Continue Reading
WiMAX security
Introduction A lot has been written on the topic of WiMAX radio technology, but what about WiMAX security? Should users feel safe that their transmitted data is free from eavesdropping and manipulation? How does a WiMAX operator ensure that only ...Continue Reading
WiMAX performance
Sprint and Clearwire formed a $14.5 billion joint venture a few weeks ago that will focus entirely on mobile WiMAX. The joint venture will be called Clearwire and includes investment from Google, Intel, Comcast, Time Warner, and Bright House ...Continue Reading
Government regulations and mobile security policies
Learn how government regulations affect your mobile security policy.Continue Reading
WiMAX services
WiMAX, a new business opportunity for service providers, is being offered in various stages by both new and established service providers.Continue Reading
WiMAX: What it is and how it works
WiMAX was once stated to be the biggest thing since the Internet. But hype and confusion have dogged the project since its beginning. The first in five articles on WiMAX will discuss WiMAX technology, applications and terminology.Continue Reading
700 MHz -- Why is it so valuable?
The 700 MHz wireless spectrum auction is causing a lot of excitement, yet the reasons why can be obscure -- Paul DeBeasi explains its importance and how it works.Continue Reading
Mobile security: Setting responsible goals
Mobile security goal setting is a straightforward, time-saving best practice for the IT professional who makes time to set responsible and attainable goals.Continue Reading
Mobile data services -- getting connected
Mobile data computing continues to grow as more service providers offer services and at increasing speeds. Different ways to connect to the mobile data network are discussed in this tip by Paul DeBeasi.Continue Reading
Mobile service providers: How to choose the right one
Finding the "right" mobile service provider might be an abstract, theoretical concept, but picking the right one for your organization shouldn't be too difficult. Here, Craig Mathias outlines some key elements to guide you in selecting the right ...Continue Reading
Mobile device compliance and workforce management
Mobile compliance issues are more complicated as federal regulations become more rigorous and require mobile devices to be compliant. Learn some best practices for ensuring mobile compliance. In last month's tip on regulatory compliance, we ...Continue Reading
Carrier mobile device management approaches in the enterprise: Mobile management, Part V
Mobile device management terms and situations are discussed in this tip to inform professionals in which situations vendor or service management is more beneficial than in-house management.Continue Reading
Best practices for corporate mobile device management: Mobile management, Part VIII
Mobile device management best practices for IT managers are found in this tip, particularly emphasizing the benefits and disadvantages of single-vendor vs. multi-device, multi-vendor strategies.Continue Reading
Mobile security, certificates and authentication: Mobile management, Part VI
Mobile security is a necessary concern of any enterprise and, as discussed in this tip, IT organizations must consider both security and authentication factors for their mobile devices.Continue Reading
Using 3G phones for laptop Internet access
Most workers who choose 3G wireless will either buy a new laptop with embedded 3G or add a new 3G card to an existing laptop. But don't overlook a third option that just might prove less expensive: using a 3G phone for laptop Internet access. Learn ...Continue Reading
iPhone in the enterprise: Can it replace a BlackBerry?
How will the iPhone fit in the enterprise? We challenged our expert to put the iPhone through a series of tests to see how well it integrates, whether it's manageable, and whether its email, calendar and contact features can replace a BlackBerry.Continue Reading
Windows Mobile emulator for device testing -- Part 2
A Windows Mobile emulator can simplify mobile device testing without costing a lot of money. In Part 1 of this series, we learned how to install and deploy the emulator. In Part 2, we explore how to access and configure the emulator.Continue Reading
Windows Mobile emulator for device testing -- Part 1
A Windows Mobile emulator can simplify mobile device testing without costing a lot of money. Whether you are attempting to develop a new mobile application, test a mobile networking configuration, or experiment with mobile device security, testing ...Continue Reading
Mobile form factors: Handhelds
The size and layout of a mobile device is just as important as what it does – and the form-factor options in handhelds are both plentiful and growing.Continue Reading
Regulatory compliance: The impact of mobile devices on the enterprise
Regulatory compliance cannot be overlooked when users are accessing and storing data on mobile devices. Enterprises must take extra precautions to extend their security processes to comply with regulations.Continue Reading
Form factors: Mobile computers
Craig Mathias looks at mobile form factors, the general size and layout of mobile devices, available to assist your mobile workforce. He explores Micro-PCs, UMPCs, tablets, subnotebooks, ultraportables and mega-notebooks.Continue Reading
Mobile data services -- A checklist of considerations
Analyzing and selecting a mobile data service can be a daunting task. This tip provides a checklist of the major factors to consider when evaluating mobile data services (GSM, CDMA and WiMAX).Continue Reading
Using Exchange Server for mobile device security
Unsecured mobile devices in the wrong hands can defy VPN security and threaten the safety of your corporate network. In this tip, learn how you can use Exchange Server 2007 to apply security policies to mobile devices and how to use Outlook Web ...Continue Reading
Mobile devices: Business or personal property?
Corporate data -- from company phone directories to confidential memos -- is floating around on devices outside the control of network and IT operations and management. In this column, Craig Mathias believes every enterprise must deal with the fact ...Continue Reading
Defining mobility solutions
Mobile solutions fall into one of three distinct philosophical categories and the solution you apply to your enterprise depends to some extent on the particular mobility needs of those involved. Craig Mathias explores three desktop replacement ...Continue Reading
Policies for mobile computing
Mobile computing policies are critical to maintaining the integrity of your organization. While there are several variables in what constitutes a mobile policy, the advice in this column will help you define your needs and understand the core ...Continue Reading
Location-based services for your mobile
In this tip, Lisa Phifer describes location-based services, emerging LBS applications and discusses ways in which your mobile workforce can benefit from LBS applications today.Continue Reading
Wireless options for PDAs and smartphones
Wireless PDA and smartphone sales are booming. Most of today's new handhelds have built-in wireless interfaces that can be used to reach other users, corporate servers, and the public Internet. Mobile connectivity has never been easier, but which ...Continue Reading
What to do when a laptop is lost or stolen
There are a few key steps to take if one of your corporate laptops is lost or stolen. These measures will help you respond rather than react, and they will get you back on the road to recovery, minimizing any future worries.Continue Reading
Mobile VPN: Closing the gap
PDA VPN clients have been around for nearly as long as PDAs themselves. From the simple PPTP client found in early Windows HPCs to standard IPsec clients embedded in today's Symbian and Windows Mobile smartphones, solutions abound for tunneling from...Continue Reading
Wireless laptop evolution
If you're cycling out older laptops or deploying a whole new fleet you need to read this. In this feature column, Lisa Phifer explores the technologies and wireless interfaces you should consider when you purchase your next laptop.Continue Reading
Challenges posed by 802.11 wireless
802.11 challenges have changed, from satisfying basic necessities like security and coverage, to addressing broader deployment issues like management and quality. Our Wireless Advisor tips have tracked that evolution, serving as an on-going ...Continue Reading
Connect to multiple 802.11 networks through one Wi-Fi adapter
New software from Microsoft enables connecting to more than one wireless network at the same time.Continue Reading
When quality counts: 802.11e, WMM, and beyond
In July 2005, the 802.11e MAC Enhancements for Quality of Service (QoS) standard achieved the consensus needed for formal IEEE approval. This long-awaited QoS extension will improve delivery of multimedia data, voice, audio, and video traffic over ...Continue Reading
B vs. G: Understanding mixed WLAN performance
Learn how to get the most from your 802.11g AP.Continue Reading
Upgrading your WLAN to WPA2
This month Lisa Phifer examines WPA2 and gives us insight into its new security features, fast roaming options and explains how to enable coexistence.Continue Reading
Creating a wireless security policy
This tip explains what WLAN security policies are, the kinds of information they should contain, and where to find policy templates and further guidance.Continue Reading
Understanding WLAN signal strength
Learn how to predict, measure, and improve wireless LAN signal strength.Continue Reading
Is there a way to identify active users on a wireless network?
Moving freely between WLAN access points
802.11 wireless stations frequently move from one wireless AP to another within the same Extended Service Set. See why this process can be transparent or frustratingly disruptive.Continue Reading
Troubleshooting Bluetooth Windows XP connection
I have set up Windows XP Internet Connection sharing over Bluetooth, but the connection will resolutely not be shared. Can you help?Continue Reading
What are "closed networks" in a cellular wireless network and why are they needed?
Using WPA without enterprise AAA
summaryContinue Reading
PDA technology for sales and marketing
Where do you see PDA technology going and aiding the business world? What are some of the new type of applications that will make a difference for sales and marketing type of users?Continue Reading
RFID tagging for employee tracking
Is there any software and hardware available (like RFID) to interface remote event-type (on/off) hardware to track employees?Continue Reading
Solving wireless signal interference from brick walls
Does having brick walls between my wireless router and PCI receiver pose any problems with the signal?Continue Reading
Can you tell me about "thin" versus "fat" WLAN?
The terms "thin" and "fat" WLAN have been applied many ways.Continue Reading
Why don't CDMA systems have SIM cards in the handset?
What is VSAT technology?
What is EAPOL and how do I disable it?
What is EAPOL and how do I disable it?Continue Reading
What's the difference between 802.1i and 802.11i?
What limits wireless bandwidth?
Open source authenticator implementation for LANs
How can I send a message to mobile from my application in VB code?
Is there a relationship between data rate and throughput in a wireless network?
Is there is any relation between the basic data rate and the throughput that can be achieved in a wireless network?Continue Reading
What are the current applications for infrared wireless?
The next step in mobility: Seamless wireless network roaming
What if users' mobile phones and/or devices could switch from a cellular carrier's wireless network to using the company's WLAN on its own, at the right time, every time?Continue Reading
The difference between embedded systems and wireless embedded systems
Retrieving information using a remote PC, via GSM/GPRS
Setting up a LAN using VSAT technology
The difference between ZigBee and IEEE 802.15.4
Wireless application development
A look at some of Microsoft's plans for Wireless application development.Continue Reading
Infrastructure mode and ad hoc mode at the same time?
Maximum transmission rates for VSAT systems
What is the difference between the ISM band and the UNII band?
What are the pros and cons of ad hoc connections versus access points?
Bluetooth frequency-hopping techniques
Challenges of mobile security
A look at some of the problems and solutions of mobile security.Continue Reading
RFID manufacturers and suppliers
AppGate secures intranet access from PDAs, laptops
Can secure many intranet applications with minimal client-side fuss.Continue Reading
Implementing a WLAN across three floors of an office building
Mobile and wireless protocols
Don't get tangled up in mobile and wireless protocols. This Mobile and Wireless Protocols Guide explains the various mobile protocols and offers tips and advice for selecting and using them in your organization.Continue Reading
Wireless authentication
Discussion of kinds of authentication.Continue Reading
What kind of systems use the CSMA protocol?
The difference between an access point and a router
Analog Microwave Radio and Digital Microwave Radio
Convergence of CDMA and GSM
Security and UWB
Benefits of UWB
Features of a wireless router
What is difference between FCC and IEEE, and between IEEE and ETSI?
Components of a mobile solution
What does it take to provide a mobile platform for your company?Continue Reading
EAP and LEAP
Define the business goals for mobile solutions
The planning process.Continue Reading
How can I measure the bit-rate of my wireless connection?
To address this question, it's important to know the difference between link speed and effective throughput, which are two very different metrics.Continue Reading