Beating bogus contacts
What is the security standard of choice for wireless LANs?
Preventing eavesdroppers on cellular calls
Using a cell phone as a modem
How do I get my wireless router to talk to my wireless access point?
What are the pros and cons of ad hoc connections versus access points?
Using the firewall feature of the Nortel contivity 1010 box
Infrared file swapping
Effective security for Dell Inspiron with 802.11g
Is there a specific WCDMA SIM card?
Configurable mobile devices that use both GSM/GPRS and CDMA?
Where can I find a GPRS mobile device with a barcode scanner?
Sharing PC default printer with laptop, wirelessly
Bluetooth for printing?
Which is better for sharing wireless connections: an access point or a router?
Passive RFID devices to locate lost children
Options for remote LED display: Optical repeaters, infrared or fiber optic cable?
Wireless local number portability: GSM vs. CDMA
Wireless LAN switching vendors
If I increase my WEP key strength, can I avoid upgrading to WPA?
Does 802.3 support IPX/SPX?
Problems with "rubber ducky" antennas
Going wireless on a Dell
VDSL, LRE and deploying a WLAN in a building without CAT5 cabling
Going wireless -- gradually
Isolating user disconnection problems
Network adapters without WPA
Option to disable SSID
Bluetooth frequency-hopping techniques
Implementing mesh networking using 802.15.4
Monitoring WLAN coverage within steel/metallic superstructure buildings
Sales department dilemma: Smartphones or PDAs?
Wide area Wi-Fi
Will my 802.11 access point interoperate with 802.11b?
Achieving blanket WLAN coverage on a university campus
RFID manufacturers and suppliers
RFID and consumer privacy concerns
Security risks of Wi-Fi enabled PDAs
Tim Scannell's mobile management predictions for 2004
Kevin Beaver's mobile security predictions for 2004
Lisa Phifer's wireless predictions for 2004
The 802.15.3 wireless specification
Updating data outside the office
Wireless design considerations for a nine-floor office building
All about 3G
The latest in wireless security
Backing up contact data from a mobile phone
Who provides mobile devices for the enterprise market?
Moore's Law and handsets
What will drive the adoption of smartphones?
Future functionalities for handsets
"Quick and dirty" options for measuring throughput
Accessing secure sites through a wireless router
Sharing wireless connections without PCI cards or APs
Configuration crisis: Wireless PCI card will not access network properly
Enterprise-class wireless security on the cheap
Wireless security audits for WLANs and BlackBerrys
Arguing for open ports
Antivirus software for corporate PDAs
Web address filtering
Sharing printers through a wireless router
Wireless Internet at Disney World and other destinations
Developing for wireless devices
Implementing a WLAN across three floors of an office building
Running PDAs on Macs
Memory/storage allocation problems
Connecting an Ashton Digital Passport 2100 computer to a satellite dish
Choosing between different security options for wireless networks
The most popular flavor of 802.11
Bluetooth SD card for Palm OS 5
Considering a Toshiba PDA with a compact flash slot
Looking for a PDA with a Firewire input
The future of Linux in the mobile phone industry
Confusion about 802.1x authentication methods
What kind of systems use the CSMA protocol?
Choosing wireless routers
The difference between an access point and a router
Analog Microwave Radio and Digital Microwave Radio
How secure are GSM networks?
Smartphones and malware
VSAT for Internet connectivity
Dynamic addresses for mobile networks
Is it worthwhile to look at Bluetooth for the office?
Wi-Fi vs. 3G
Convergence of CDMA and GSM
Security and UWB
Benefits of UWB
Will Toshiba come out with a Centrino Tablet PC?
Mobile CRM application for the Palm platform
Security issues for tablet PCs
CDPD wireless service providers: Is this the end?
Extending the range of a wireless router
Features of a wireless router
Can I push a policy ACL onto a Pocket PC
Biometrics for PDA security
802.1x for WLAN security
Connecting small networks