Tips
Tips
-
WiMAX: What it is and how it works
WiMAX was once stated to be the biggest thing since the Internet. But hype and confusion have dogged the project since its beginning. The first in five articles on WiMAX will discuss WiMAX technology, applications and terminology. Continue Reading
-
700 MHz -- Why is it so valuable?
The 700 MHz wireless spectrum auction is causing a lot of excitement, yet the reasons why can be obscure -- Paul DeBeasi explains its importance and how it works. Continue Reading
-
Mobile security: Setting responsible goals
Mobile security goal setting is a straightforward, time-saving best practice for the IT professional who makes time to set responsible and attainable goals. Continue Reading
-
Mobile data services -- getting connected
Mobile data computing continues to grow as more service providers offer services and at increasing speeds. Different ways to connect to the mobile data network are discussed in this tip by Paul DeBeasi. Continue Reading
-
Mobile service providers: How to choose the right one
Finding the "right" mobile service provider might be an abstract, theoretical concept, but picking the right one for your organization shouldn't be too difficult. Here, Craig Mathias outlines some key elements to guide you in selecting the right ... Continue Reading
-
Mobile device compliance and workforce management
Mobile compliance issues are more complicated as federal regulations become more rigorous and require mobile devices to be compliant. Learn some best practices for ensuring mobile compliance. In last month's tip on regulatory compliance, we ... Continue Reading
-
Carrier mobile device management approaches in the enterprise: Mobile management, Part V
Mobile device management terms and situations are discussed in this tip to inform professionals in which situations vendor or service management is more beneficial than in-house management. Continue Reading
-
Best practices for corporate mobile device management: Mobile management, Part VIII
Mobile device management best practices for IT managers are found in this tip, particularly emphasizing the benefits and disadvantages of single-vendor vs. multi-device, multi-vendor strategies. Continue Reading
-
Mobile security, certificates and authentication: Mobile management, Part VI
Mobile security is a necessary concern of any enterprise and, as discussed in this tip, IT organizations must consider both security and authentication factors for their mobile devices. Continue Reading
-
Using 3G phones for laptop Internet access
Most workers who choose 3G wireless will either buy a new laptop with embedded 3G or add a new 3G card to an existing laptop. But don't overlook a third option that just might prove less expensive: using a 3G phone for laptop Internet access. Learn ... Continue Reading
-
iPhone in the enterprise: Can it replace a BlackBerry?
How will the iPhone fit in the enterprise? We challenged our expert to put the iPhone through a series of tests to see how well it integrates, whether it's manageable, and whether its email, calendar and contact features can replace a BlackBerry. Continue Reading
-
Windows Mobile emulator for device testing -- Part 2
A Windows Mobile emulator can simplify mobile device testing without costing a lot of money. In Part 1 of this series, we learned how to install and deploy the emulator. In Part 2, we explore how to access and configure the emulator. Continue Reading
-
Windows Mobile emulator for device testing -- Part 1
A Windows Mobile emulator can simplify mobile device testing without costing a lot of money. Whether you are attempting to develop a new mobile application, test a mobile networking configuration, or experiment with mobile device security, testing ... Continue Reading
-
Mobile form factors: Handhelds
The size and layout of a mobile device is just as important as what it does – and the form-factor options in handhelds are both plentiful and growing. Continue Reading
-
Regulatory compliance: The impact of mobile devices on the enterprise
Regulatory compliance cannot be overlooked when users are accessing and storing data on mobile devices. Enterprises must take extra precautions to extend their security processes to comply with regulations. Continue Reading
-
Form factors: Mobile computers
Craig Mathias looks at mobile form factors, the general size and layout of mobile devices, available to assist your mobile workforce. He explores Micro-PCs, UMPCs, tablets, subnotebooks, ultraportables and mega-notebooks. Continue Reading
-
Mobile data services -- A checklist of considerations
Analyzing and selecting a mobile data service can be a daunting task. This tip provides a checklist of the major factors to consider when evaluating mobile data services (GSM, CDMA and WiMAX). Continue Reading
-
Using Exchange Server for mobile device security
Unsecured mobile devices in the wrong hands can defy VPN security and threaten the safety of your corporate network. In this tip, learn how you can use Exchange Server 2007 to apply security policies to mobile devices and how to use Outlook Web ... Continue Reading
-
Mobile devices: Business or personal property?
Corporate data -- from company phone directories to confidential memos -- is floating around on devices outside the control of network and IT operations and management. In this column, Craig Mathias believes every enterprise must deal with the fact ... Continue Reading
-
Defining mobility solutions
Mobile solutions fall into one of three distinct philosophical categories and the solution you apply to your enterprise depends to some extent on the particular mobility needs of those involved. Craig Mathias explores three desktop replacement ... Continue Reading
-
Policies for mobile computing
Mobile computing policies are critical to maintaining the integrity of your organization. While there are several variables in what constitutes a mobile policy, the advice in this column will help you define your needs and understand the core ... Continue Reading
-
Location-based services for your mobile
In this tip, Lisa Phifer describes location-based services, emerging LBS applications and discusses ways in which your mobile workforce can benefit from LBS applications today. Continue Reading
-
Wireless options for PDAs and smartphones
Wireless PDA and smartphone sales are booming. Most of today's new handhelds have built-in wireless interfaces that can be used to reach other users, corporate servers, and the public Internet. Mobile connectivity has never been easier, but which ... Continue Reading
-
What to do when a laptop is lost or stolen
There are a few key steps to take if one of your corporate laptops is lost or stolen. These measures will help you respond rather than react, and they will get you back on the road to recovery, minimizing any future worries. Continue Reading
-
Mobile VPN: Closing the gap
PDA VPN clients have been around for nearly as long as PDAs themselves. From the simple PPTP client found in early Windows HPCs to standard IPsec clients embedded in today's Symbian and Windows Mobile smartphones, solutions abound for tunneling from... Continue Reading
-
Wireless laptop evolution
If you're cycling out older laptops or deploying a whole new fleet you need to read this. In this feature column, Lisa Phifer explores the technologies and wireless interfaces you should consider when you purchase your next laptop. Continue Reading
-
Challenges posed by 802.11 wireless
802.11 challenges have changed, from satisfying basic necessities like security and coverage, to addressing broader deployment issues like management and quality. Our Wireless Advisor tips have tracked that evolution, serving as an on-going ... Continue Reading
-
Connect to multiple 802.11 networks through one Wi-Fi adapter
New software from Microsoft enables connecting to more than one wireless network at the same time. Continue Reading
-
When quality counts: 802.11e, WMM, and beyond
In July 2005, the 802.11e MAC Enhancements for Quality of Service (QoS) standard achieved the consensus needed for formal IEEE approval. This long-awaited QoS extension will improve delivery of multimedia data, voice, audio, and video traffic over ... Continue Reading
-
B vs. G: Understanding mixed WLAN performance
Learn how to get the most from your 802.11g AP. Continue Reading
-
Upgrading your WLAN to WPA2
This month Lisa Phifer examines WPA2 and gives us insight into its new security features, fast roaming options and explains how to enable coexistence. Continue Reading
-
Creating a wireless security policy
This tip explains what WLAN security policies are, the kinds of information they should contain, and where to find policy templates and further guidance. Continue Reading
-
Understanding WLAN signal strength
Learn how to predict, measure, and improve wireless LAN signal strength. Continue Reading
-
Moving freely between WLAN access points
802.11 wireless stations frequently move from one wireless AP to another within the same Extended Service Set. See why this process can be transparent or frustratingly disruptive. Continue Reading
-
Using WPA without enterprise AAA
summary Continue Reading
-
The next step in mobility: Seamless wireless network roaming
What if users' mobile phones and/or devices could switch from a cellular carrier's wireless network to using the company's WLAN on its own, at the right time, every time? Continue Reading
-
Wireless application development
A look at some of Microsoft's plans for Wireless application development. Continue Reading
-
Challenges of mobile security
A look at some of the problems and solutions of mobile security. Continue Reading
-
AppGate secures intranet access from PDAs, laptops
Can secure many intranet applications with minimal client-side fuss. Continue Reading
-
Mobile and wireless protocols
Don't get tangled up in mobile and wireless protocols. This Mobile and Wireless Protocols Guide explains the various mobile protocols and offers tips and advice for selecting and using them in your organization. Continue Reading
-
Wireless authentication
Discussion of kinds of authentication. Continue Reading
-
Components of a mobile solution
What does it take to provide a mobile platform for your company? Continue Reading
-
Define the business goals for mobile solutions
The planning process. Continue Reading