Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Mobile articles

Case Study: Airport covered by radio-on-fibre

Passengers and staff share the infrastructure

Getting a handle on remote users

The technology is simple, compared to the human factors.

Case Study: Boeing tracks parts with Wireless LAN

Cisco caught up with Boeing's needs.

Know your wireless enemy

Understanding the tools that could be used against your WLAN.

How to blend WEP, WPA, and 802.11i

Mix and match Wi-fi security schemes - on the same network!

Case Study: Ballet school dances with NEC for VoIP

Local provider Nortel couldn't match Japanese footwork.

Case Study: RFID pays for itself, says Wal-Mart

Sceptics proven wrong, says vice president of IS.

Design for "worst-case" Wi-Fi

Try and get ready for the "extra" apps.

The ten-minute guide to wireless security - part two

Part two - is encryption security that confusing?

Case Study: Wireless help to the homeless

Good reception for the poor.

Use your BlackBerry as a notebook

Can it take the place of a notebook, on a business trip?

Security schemes for handheld devices

There's all sorts of reasons why PC security won't port over.

Case Study: RFID stops elks wasting away

Active RFID tracks animals form a safe distance...

How to beat wireless attacks

Attacks change to meet the changes in WiFi products.

Protect wireless-enabled laptops

Turn wireless off if you're not using it!

Case Study: Rugged handhelds help the Tube

Maintenance goes better with tough terminals.

Case Study: US Census buys 0.5m Windows PDAs

Cut down devices in biggest ever mobile roll-out

Avoid Wi-Fi 'false positives'

Auto-classification helps avoid wireless red herrings

WiFi's security secret - authentication

Want wireless authentication on-the-cheap?

Case Study: World's largest Wi-Fi network uses Linux

Schools in Victorial get secure access.

Case Study: Wireless mash-up keeps track of Vegas' pipes

the water district doesn't have to gamble any more...

The ten-minute guide to wireless security - part one

Part one: secure the wireless access point

Case Study: Energy inspectors use hardy mobiles

Handhelds that can go where they're needed.

Case Study: hospital locks up wireless access points

Tool guards 250 wireless access points at Carilion Health System.

Troubleshoot laptop wireless trouble

Watch out for interference and competition...

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map