- Tips on Setting Up and Hosting a Wi-Fi Hotspot
- Oct 21, 2009
- Eric Geier shares tips on installing and operating a Wi-Fi hotspot.
|
- Tips to Secure Your Home Wi-Fi Network
- Jul 10, 2009
- Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
|
- Tips to Secure Your Small Business Wi-Fi Network
- Jul 21, 2009
- Eric Geier presents twelve critical tips to consider when securing a small business wireless network.
|
- Tracking the Six Wireless Device Classes of the Internet
- Jan 11, 2002
- Developing apps for wireless gadgets? You need to understand the six device classes of the wireless Net.
|
- Trash Your Pocket PC Synchronization Cable and Go Wireless
- Feb 10, 2006
- Do you daydream about new ways to be wireless? Kulvir Bhogal shows you how to synchronize your wirelessly-enabled Pocket PC with your PC over your wireless network — with no strings attached!
|
- Understanding the Telecommunications Revolution
- Dec 28, 2001
- The new multimedia realm is allowing us to include vital physical cues in the information stream, introducing a physical reality into the world of electronic communications, goods, and services.
|
- Understanding the Three Wireless Network Groups of the Internet
- Jan 11, 2002
- Hey, man - here's the scoop on WAN, LAN, PAN, and even SAN.
|
- Unplug and Stay Connected
- Feb 8, 2002
- Wireless technology is, of course, a natural for road trips. Here are some decisions to consider in order to fit your needs and budget.
|
- Unwitting Collaborators, Part 6: Wireless Insecurity
- Jul 26, 2002
- "Wardrivers" don't need much more than a laptop, a network card, and a car to find and infiltrate wireless networks. This article explains how "wardriving" works and how to defend your company against it.
|
- Using an i-mode Simulator
- Oct 26, 2001
- In this article, Paul Wallace provides information about i-mode simulators that imitate the handheld screen so you can test your wireless page designs on your desktop computer.
|
- Using Google Mobile on Your Cell Phone
- Apr 13, 2007
- Google expert Michael Miller shows you how to use Google Mobile on your cell phone to view maps, read news, send and receive email, and search the web.
|
- Using the Java Wireless Toolkit
- Apr 16, 2004
- Bob Reselman shows you how to use the Java Wireless Toolkit to turn a user's cell phone into a mini tune player. Why would you want to do this? You get to learn a thing or two about writing Java code for mobile devices. And it's fun!
|
- Using Wireless Technology to Augment Network Availability and Disaster Recovery
- Jul 13, 2007
- Leverage your own "safety nets" to improve your disaster survivability.
|
- Using Your iPod in the Car
- Jun 22, 2007
|
- Using Your iPod in the Car
- Apr 9, 2007
|
- WAP Development with WML (Wireless Markup Language)
- Mar 29, 2002
- This sample chapter describes the evolution of WML and what it's about. It explains what WML can and can't do, provides a comparison to other markup languages, covers WML structure and syntax, and illustrates the essential WML elements and attributes used with all WAP applications.
|
- WDM Technology and Issues in WDM Optical Networks
- May 24, 2002
- Understand the "big picture" of WDM optical networks. This excerpt introduces several issues concerning the design of these networks, from routing and wavelength assignment to optical multicast routing.
|
- WEP VulnerabilitiesWired Equivalent Privacy?
- Dec 23, 2003
- WEP was not designed to be the end-all, be-all security solution for wireless networks and WEP has a number of shortcomings, which make it vulnerable to several classes of attacks. The point of this chapter is to do more than just tell you that WEP is bad. The goal is to paint a picture of what WEP was intended to do, how it works, and why it fails to live up to its design goals.
|
- What are Bluetooth Profiles For?
- May 11, 2001
- Bluetooth uses profiles to keep devices interoperating smoothly and easily. In this article, Jennifer Bray explains how Bluetooth profiles are used and offers hints of those to come.
|
- What are Bluetooth Profiles?
- May 2, 2003
- The answer: Profiles enable end-user functionality by defining user and behaviour characteristics. Read on if you would like to know more about Profiles and how they fit into the Bluetooth solution.
|