Problem solve

Get help with specific problems with your technologies, process and projects.

Problem solve

Get help with specific problems with your technologies, process and projects.

  • Wireless options for PDAs and smartphones

    Wireless PDA and smartphone sales are booming. Most of today's new handhelds have built-in wireless interfaces that can be used to reach other users, corporate servers, and the public Internet. Mobile connectivity has never been easier, but which ... Continue Reading

  • Securing Bluetooth

    Reducing Bluetooth security threats requires not only authenticating and encrypting all Bluetooth traffic and defined security policies but wise choices when configuring, assessing, patching and security auditing Bluetooth enable mobile devices. Continue Reading

  • Managing mobile operators: Giving a passing grade

    Everyone likes to gripe about their wireless operators, complaining that they pay too much for services that aren't quite what they want. Many a corporate telecom department has weighed in with its own set of opinions about the things that are wrong... Continue Reading

  • Near-field communications: The next small thing

    Near-field communications, a short-range wireless connectivity standard, is designed to work over a distance of just a few centimeters or so. In this column, Craig Mathias discusses its potential. Continue Reading

  • The Pocket PC -- really

    The physical attributes of mobile devices are particularly important to mobile road warriors. In this tip, Craig Mathias discusses the possibilities of having a fully functional PC but with a PDA form factor. Continue Reading

  • 3G devices: Don't get tied down with tethering

    More and more mobile devices are appearing on the marketplace with 3G capabilities. But the impacts of broadband wireless are far and wide, and anyone interested in taking advantage of new smartphones and faster networks should be aware of both the ...Continue Reading

  • The mobile power challenge

    Mobile devices are power-hungry and the fundamental need to continue to improve both power-to-weight and absolute capacity, as well as a desire to lower recharge times, have resulted in a number of advances in battery research.Continue Reading

  • In-building wireless, Part 1: Making the case

    Poor on-campus cellular coverage is a common problem. Dropped calls, weak signals and workers standing by the nearest window are commonplace in many businesses. Given this challenge, the question is what role the enterprise IT department should play...Continue Reading

  • In-building wireless, Part 2: Best practices

    In this tip, Daniel Taylor discuss best practices around design objectives, budgeting, architecture and planning in-building wireless.Continue Reading

  • Laptop crypto: Do it, but realize it's not a panacea

    Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy.Continue Reading

  • Mobile VPN roadtest

    Mobile VPNs let users keep the same virtual IP address when roaming from hot spot to cellular to office, preserving application and login state. In this tip, Phifer explores the business problems addressed by Mobile VPNs and shares her experience ...Continue Reading

  • Extend notebook battery life by managing power consumption

    If you're not happy with the power-management software provided by your notebook maker or by what's provided in Windows by default, a program called SpeedswitchXP might help fit the bill.Continue Reading

  • The Era of Infocentricity

    Craig Mathias says the rise of mobility has taught us to rethink IT to the extent of redefining what a computer is. The benefits of this are enormous and define what he terms the Era of Infocentricity. Say goodbye to the compu- and ...Continue Reading

  • What to do when a laptop is lost or stolen

    There are a few key steps to take if one of your corporate laptops is lost or stolen. These measures will help you respond rather than react, and they will get you back on the road to recovery, minimizing any future worries.Continue Reading

  • Case Study: Mobilizing the Dutch Rail

    With 10,000 devices in the field, spread across 50 train stations, the case study for mobile applications deployment at Nederlandse Spoorwegen (Dutch Rail) is an excellent example of a strategic investment in mobile technologies.Continue Reading

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close