News

Wireless networking

  • November 05, 2007 05 Nov'07

    Google announces open source operating system for smartphones

    After months of speculation, Google has officially announced Android, an mobile devices OS it's developing in partnership with a wide variety of companies.

  • November 01, 2007 01 Nov'07

    ISCSI storage gets performance makeover

    Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products.

  • October 23, 2007 23 Oct'07

    How to manage mobility

    Planning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right.

  • September 20, 2007 20 Sep'07

    Wireless troubleshooting

    Wireless network troubleshooting basics are discussed in this guide.

  • September 19, 2007 19 Sep'07

    802.11 protocols

    802.11 wireless protocols and deployment basics are discussed in this guide.

  • September 18, 2007 18 Sep'07

    Cisco to acquire Cognio

    Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility.

  • September 18, 2007 18 Sep'07

    Wireless security

    Wireless security and polices are covered in this guide.

  • September 17, 2007 17 Sep'07

    Wireless network deployment and management

    Wireless network deployment and management are discussed in this guide.

  • September 17, 2007 17 Sep'07

    Wireless access points

    The basics of wireless access point (AP) as well as configuration and placement are covered in this guide.

  • September 16, 2007 16 Sep'07

    Wireless protocols learning guide

    Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide.

  • September 04, 2007 04 Sep'07

    Cisco goes next generation with 802.11n

    Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access.

  • September 02, 2007 02 Sep'07

    Wireless network security: Controlling secondary connections

    Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured.

  • August 23, 2007 23 Aug'07

    Nokia Intellisync boosts device management

    Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities.

  • August 08, 2007 08 Aug'07

    NAS appliance specifications

    NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...

  • August 08, 2007 08 Aug'07

    Wi-Fi simplicity edging out Wi-Fi security

    Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.

  • August 08, 2007 08 Aug'07

    WLANs require investment to yield benefits, study says

    WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.

  • August 08, 2007 08 Aug'07

    WLANs require investment to yield benefits, study says

    WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group.

  • July 25, 2007 25 Jul'07

    Cisco issues warning for wireless LAN controller flaws

    Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University.

  • July 19, 2007 19 Jul'07

    Wireless interference can be frustrating (and fun?)

    Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one ...

  • April 29, 2007 29 Apr'07

    WEP: Wireless security's broken skeleton in the closet

    WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.

  • April 04, 2007 04 Apr'07

    Wireless VoIP market to grow rapidly

    VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012.

  • March 22, 2007 22 Mar'07

    11n will boost speed, prompt upgrades

    802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.

  • March 11, 2007 11 Mar'07

    Wi-Fi interference

    In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs.

  • February 28, 2007 28 Feb'07

    RFID cloning presentation moves forward despite legal threats

    Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.

  • February 27, 2007 27 Feb'07

    Black Hat presenter nixes RFID cloning demo under pressure

    A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.

  • December 18, 2006 18 Dec'06

    Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...

  • December 11, 2006 11 Dec'06

    SIP desktop phone blends functionality, style

    VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.

  • November 28, 2006 28 Nov'06

    Effective wireless security is available, but holes exist

    Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.

  • October 30, 2006 30 Oct'06

    Wireless network security testing

    The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...

  • October 15, 2006 15 Oct'06

    Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • August 14, 2006 14 Aug'06

    Wireless security boost for laptops outside the office

    >Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?

  • August 02, 2006 02 Aug'06

    RFID security issues are cause for corporate concern

    Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...

  • July 26, 2006 26 Jul'06

    Blue Cross bears burden of 'no wireless' policy

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • November 16, 2005 16 Nov'05

    Wireless security: Companies deal with software updates

    A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • May 11, 2005 11 May'05

    A new era of computer worms: Wireless mobile worms

    In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.

  • March 08, 2005 08 Mar'05

    Small businesses targeted with RFID

  • December 01, 2004 01 Dec'04

    Phreaks love Bluetooth

    Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.

  • May 23, 2004 23 May'04

    Hacking for Dummies: Chapter 10 -- Wireless LANs

    Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.

  • November 15, 2000 15 Nov'00

    Wap usage: Planes, phones and automobiles



    So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate...

CIO
Security
Networking
Data Center
Data Management
Close