Which company do you think Wal-Mart is likely to use for its RFID system?
Does putting a laptop into standby mode protect the hard drive as much as doing a full shutdown?
Adoption of 802.11j
What sort of range does a typical 802.11g 2.4GHz router have?
What vulnerability is documented for RFC 3118?
Is there a way to identify active users on a wireless network?
What encryption standard is becoming the most widely accepted for US Government use?
Can I use Bluetooth or Wi-Fi to transfer files between laptops?
Troubleshooting Bluetooth Windows XP connection
What are "closed networks" in a cellular wireless network and why are they needed?
What is the most cost effective way to secure our wireless access point?
Where could I find information to write a C++ application in Windows
Connectivity issue for remote worker
Where could we find a RF expert that could visit my organization
Lisa, I have another "sharing printers" question, but a bit different than the one I read on site.
Mobilizing Web-enabled applications
Do you think that 3G technologies will increase adoption of wireless adoption by healthcare pros?
PDA technology for sales and marketing
Licensing requirements for phone synchronization software and cables
RFID tagging for employee tracking
Sharing info through Palms via GRPS
Can you tell me about "thin" versus "fat" WLAN?
Wireless security and spyware - should I avoid Microsoft products?
Solving wireless signal interference from brick walls
Can SMS messages be printed from a mobile phone without Internet connectivity?
Why don't CDMA systems have SIM cards in the handset?
Can I charge my mobile (Nokia) with another charger?
I need greater internal memory than my Palm offers - should I switch to Pocket PC?
What's the difference between a wireless bridge and a wireless access point?
Managing mobile in the transportation industry
How can I safe guard data if an employee loses their mobile device?
Developing and maintaining field based mobile applications
What should I consider mobilizing in my company?
What is VSAT technology?
What is EAPOL and how do I disable it?
Can text messages and e-mail sent from a cell phone be intercepted by someone else?
Is Java really that bad on mobile applications?
Implementing a split VLAN wireless infrastructure
Can you tell me about security in Bluetooth technology?
Using a cell phone as a modem for Internet acccess
What is the Mobile Computing Help Desk?
What is the difference between an access point and a bridge?
What's the difference between 802.1i and 802.11i?
Splitter causing power loss between sites
How-to guides for 802.11i
What limits wireless bandwidth?
What effect will IPv6 have on Wi-Fi?
Is a compact flash card modem or a wireless LAN card better for occasional use?
Open source authenticator implementation for LANs
Problem maintaining connectivity between AP and clients
How can I calculate the value for reauthorizations for different encryption methods?
Creating an Office Suite on a mobile phone
Is there a relationship between data rate and throughput in a wireless network?
How can I send a message to mobile from my application in VB code?
What types of applications are not suitable for an occasionally connected model?
Why doesn't Cisco's LEAP technology work with laptops with Centrino technology?
Deploying both a public and private WLANs
Can I get IP address(es) of an AP if I know its MAC address?
Why use 802.15.4 or ZigBee?
How can I protect my Pocket PC from attackers in hot spots?
Implementing a hardware routing solution with an open MAC filter
How many mobile devices will have embedded wireless capabilities?
Can you tell me about wireless wide area networks?
What are the current applications for infrared wireless?
A cellular solution worth repeating
Can't access work stations on the wireless LAN from stations on the router
Long-range plans for short-range technologies
Is there a product that combines an ADSL modem and a wireless router?
Indicating a favored AP in XP
Going the 'dish-tance' with satellite communications
Protecting sensitive data from neighboring WLANs on the same channel
How safe is SMS?
Standards (other than ZigBee) built on 802.15.4
Is mesh networking limited by interference?
The difference between embedded systems and wireless embedded systems
Retrieving information using a remote PC, via GSM/GPRS
Finding the talk of the VoIP town
Finding a job in wireless LANs
Interference and wireless PC cards
Measuring signal-to-noise ratio
How does frequency hopping work?
Personal cellular and other wireless dreams
Increasing EIRP in 2.4 GHz radios
Setting up a LAN using VSAT technology
How can I evaluate whether my applications should be mobilized?
Why put local data on a mobile device as opposed to keeping it on the network?
Wireless security training
Security risks at Starbucks
The difference between ZigBee and IEEE 802.15.4
WLAN security issues
PDAs with WLAN capabilities
Forcing updates on wireless devices
Encrypting files on Pocket PC
Benefits to upgrading to 802.11i
Infrastructure mode and ad hoc mode at the same time?
LEAP on a Pocket PC
Simultaneous intranet and visitor access
Considerations for a small business WLAN, part 6: Additional software