Wireless networking
Wireless networking has freed IT users from the confines of their desk and the wired network. Technologies such as 802.11 Wi-FI, Bluetooth and even satellite links have opened up new opportunities for IT innovation. We analyse the latest trends and technologies.
-
E-Zine
13 Oct 2023
CW EMEA: Prepare for AI explosion
In this month’s CW EMEA, we look at generative artificial intelligence, which Accenture claims is the next big thing in enterprise IT. The IT services giant says GenAI will transform 40% of all working hours – and it is putting its money where its mouth is with plans to invest $3bn in AI and create 40,000 AI-focused roles. Part of the huge investment has already been assigned to the creation of an AI and generative AI lab in Brussels focused on the public sector in Europe. We also look at a Deutsche Telekom-led consortium’s demo of multi-supplier non-real-time RAN optimisation, how last month’s Ryder Cup tested out technology to improve how fans digitally consume the event, and find out how Zurich Insurance has cut the time it takes to complete development of ServiceNow applications. Read the issue now. Continue Reading
-
News
28 Sep 2021
Dutch IT firm transforms HR policy built on lessons from pandemic
Software firm rips up human resources rule book and replaces it with a hybrid working policy Continue Reading
-
News
05 Jan 2011
BCS CEO David Clarke talks about the future of the IT industry
David Clarke, CEO of the chartered institute of computing the BCS, talks to Computer Weekly about being awarded an MBE, the future of the IT profession and tackling a membership revolt against his leadership last year. Continue Reading
By- Kathleen Hall, TechTarget
-
Photo Story
10 Nov 2010
Unified Comms for the smaller business
Bob Tarzey from Quocirca looks at how smaller businesses can benefit from deploying unified communications Continue Reading
By -
Photo Story
23 Jul 2010
British Airways launches mobile phone apps
BA has launched apps for iPhone, Android and Blackberry mobile devices to allow mobile check-in and travel updates to passengers Continue Reading
-
Photo Story
29 Jun 2010
Microsoft Home explores future uses of technology
The Microsoft Home explores technology that might enhance life at home in the next five to ten years. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jun 2010
PRIMER: WiFi sniffers
Learn about WiFi sniffers, how they operate, how they can help to manage your WLANs and why Google is far from alone in its use of the technology. Continue Reading
By- Richard Chirgwin
-
Photo Story
06 Nov 2009
Photos: An Apple iPhone app for everyone
To celebrate the availability of 100,000 apps on the Apple App Store, we have compiled a list of apps with something for everyone Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Oct 2008
Using iPerf to measure WLAN performance
Learn how to measure TCP/UDP, throughput, loss and delay with iPerf, an open source network testing tool. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
12 Aug 2008
How do I increase network signal strength over a large distance?
Want to build a WLAN that covers a large area? Lisa Phifer explains that you'l need mutiple access points and clever use of antennae. Continue Reading
By- Lisa Phifer, Core Competence
-
News
15 Jul 2008
Linksys WAP2000 Business Access Point: Review and configuration
Our labs run their eyes over Linksys' new WAP 2000, a VoIP and WLAN router for small businesses. Continue Reading
By- SearchNetworking.com.au staff
-
Tip
12 Jun 2008
What are the best methods for handling rogue access points?
Michael Gregg explains how to enforce network policy and handle rogue access points (APs) in this expert response. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
News
29 May 2008
Cisco smartens up the wireless network with Motion platform
Cisco will soon release a new product that integrates wireless devices and wired networks to enable seamless handovers and uninterrupted data access. Continue Reading
By- Michael Morisy, TechTarget
-
News
20 May 2008
What is 802.11n "Greenfield" mode?
802.11n has a special facility called "Greenfield" mode to help it increase speed. Continue Reading
By- Lisa Phifer, Core Competence
-
News
13 Mar 2008
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. Continue Reading
By- David B. Jacobs
-
News
24 Feb 2008
Six steps to create a wireless LAN
Wireless LANs are deceptively simple to create. Follow our guide to ensure your WLAN has perfect coverage, can handle your applications and is easy to manage. Continue Reading
By- Yuval Shavit
-
News
17 Feb 2008
Introduction to wireless networks - from "The book of wireless"
Learn about the standards and specifications that control wireless networks and explains how data moves through the network from one computer to another. Continue Reading
By- No Starch Press
-
Tip
10 Jan 2008
Understanding 802.11n wireless antennas
Learn how 802.11n wireless antennas increase network footprint, available bandwidth and resilience to problems that crippled older 802.11a/b/g access points. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
19 Nov 2007
Wi-Fi linked to childhood autism
A study published this week in the Australasian Journal of Clinical Environmental Medicine warns that wireless communication technology may be responsible for accelerating the rise in autism among children. Continue Reading
-
News
15 Nov 2007
Wireless LAN performance
Benchmarking your wireless LAN performance is tricky. This tip examines key issues and offers advice for effectively measuring your WLAN performance. Continue Reading
-
News
05 Nov 2007
Google announces open source operating system for smartphones
After months of speculation, Google has officially announced Android, an mobile devices OS it's developing in partnership with a wide variety of companies. Continue Reading
By -
News
01 Nov 2007
ISCSI storage gets performance makeover
Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products. Continue Reading
By- SearchStorage.com Staff
-
News
23 Oct 2007
How to manage mobility
Planning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right. Continue Reading
By- Simon Forge
-
News
20 Sep 2007
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
19 Sep 2007
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
18 Sep 2007
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility. Continue Reading
By- Andrew R. Hickey
-
News
18 Sep 2007
Wireless security
Wireless security and polices are covered in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
17 Sep 2007
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
17 Sep 2007
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
16 Sep 2007
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
Feature
06 Sep 2007
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment is a significant step toward interoperability and seamless mobile connectivity between private WLANs and public wireless and cellular networks. Continue Reading
-
News
04 Sep 2007
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access. Continue Reading
By- Andrew R. Hickey
-
News
02 Sep 2007
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured. Continue Reading
By- Professor Michel Cukier
-
News
23 Aug 2007
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
17 Aug 2007
Voice over WLAN improves a hospital's communications
A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee satisfaction. Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
09 Aug 2007
Upcoming wireless standards promise managed WLANs
Learn about two new IEEE standards, 802.11k and 802.11v, which aim to improve wireless the problems over overlapping wireless networks, in this tip. Continue Reading
By- David Jacobs
-
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
08 Aug 2007
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
By- Andrew R. Hickey
-
News
08 Aug 2007
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
By- Andrew R. Hickey
-
News
25 Jul 2007
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Jul 2007
Wireless interference can be frustrating (and fun?)
Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one wireless network, can have a strong impact. Continue Reading
By- Andrew R. Hickey
-
News
29 Apr 2007
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Continue Reading
By- Andrew R. Hickey
-
Tip
23 Apr 2007
What can we do to connect our wireless router to our wireless client?
Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem. Continue Reading
By- Lisa Phifer, Core Competence
-
News
04 Apr 2007
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
28 Mar 2007
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
28 Mar 2007
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
22 Mar 2007
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading
By- Andrew R. Hickey
-
News
11 Mar 2007
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs. Continue Reading
-
Feature
01 Mar 2007
Black Hat RFID controversy has bloggers up in arms
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading
-
News
28 Feb 2007
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
-
Feature
28 Feb 2007
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
News
27 Feb 2007
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
10 Jan 2007
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading
-
News
18 Dec 2006
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community considerations, controller architecture and access point placement Continue Reading
By- Robbie Harrell
-
Tip
18 Dec 2006
What are the fundamentals of ATM and ISDN?
Lisa Phifer explains the fundamentals of ATM and ISDN and why they are used. Continue Reading
By- Lisa Phifer, Core Competence
-
News
11 Dec 2006
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
Tip
03 Dec 2006
Access your ISA and Exchange Server from outside the office
Learn how to configure your Linksys router so that you can access your ISA and Exchange Server from outside the office in this expert response by Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
28 Nov 2006
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it. Continue Reading
By- Krissi Danielsson, Contributor
-
Tip
22 Nov 2006
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Continue Reading
By -
News
30 Oct 2006
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
17 Oct 2006
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
Tip
15 Oct 2006
Creating a WPA2 compliant network
Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Oct 2006
High-gain antennas and the near field effect
In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Oct 2006
Wireless connection in the wilderness
Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain. Continue Reading
By- Lisa Phifer, Core Competence
-
News
15 Oct 2006
Flaw found in Toshiba wireless device driver
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. Continue Reading
By -
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
By- Andrew R. Hickey
-
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
By- Andrew R. Hickey
-
News
14 Sep 2006
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; the capability to do this is built right in XP. Continue Reading
By- Rahul Shah
-
News
06 Sep 2006
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
By- Amanda Mitchell, News Editor
-
News
05 Sep 2006
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
By- Harris Weisman, Contributing Writer
-
Feature
04 Sep 2006
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Tip
20 Aug 2006
Secure network against illegal users
Lisa Phifer gives advice on how to handle illegal users on a network. Continue Reading
By- Lisa Phifer, Core Competence
-
News
14 Aug 2006
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Continue Reading
By- Andrew R. Hickey
-
News
02 Aug 2006
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business benefits. Continue Reading
By- Tim Scannell, TechTarget
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
28 Nov 2005
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
News
21 Nov 2005
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
By -
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
By -
News
16 Nov 2005
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
By -
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
-
Feature
15 Apr 2005
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
- News 08 Mar 2005
-
News
01 Dec 2004
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Continue Reading
By -
News
23 May 2004
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
Feature
13 Nov 2003
How to secure a wireless Lan
Stuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan... Continue Reading
By- Stuart Okin and Ian Hellen
-
News
15 Nov 2000
Wap usage: Planes, phones and automobiles
So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate... Continue Reading -
Feature
01 Nov 2000
Tags take on the barcode
Radio frequency tags could be the technology that kills off the barcode. Bill Goodwin explains how they work and what is holding... Continue Reading
By- Bill Goodwin, Computer Weekly
- Feature 12 Jul 2000