Techworld - infrastructure and networking news and reviews
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business

Home | News | Insight | How-tos | Whitepapers | Case studies | Interviews | Briefings | Reviews | Blog

TOP MID-SIZED BUSINESS ARTICLE

31 January

The war of indoor wireless

There's more than one way to converge indoor and outdoor phones. The Wi-Fi warriors will have to fight femtocells.


More MID-SIZED BUSINESS INSIGHT ARTICLES

  • What is Motorola going to do with Symbol?
    Motorola is buying Symbol - but didn't it already have some projects involving other WLAN partners?
  • "I'm sorry Dave, I'm afraid I can't do that."
    Talking to your computer has been a staple of science fiction since at least the 1960s, but it looks as if it's finally coming within reach.
  • Critics gun for Microsoft's patch cycle
    Microsoft has been slow to respond to security threats in its software, leaving others to do its job.
  • Low power is future for high-powered servers
    Electricity consumed by a server over its lifetime could cost as much as the hardware, says one analyst, as server vendors increasingly address energy efficiency.
  • Users unfazed by consumer Vista OS delay
    Microsoft?s announcement of a delay to the planned release of Vista won?t adversely affect the plans of most large corporations. That's primarily because few planned to roll out Vista anyway.
  • WiFi's security secret - authentication
    Wireless authentication is for big companies. Wrong. It is now within reach of the ordinary user, assuming they are actually listening...
  • Are smart switches all the SMB needs?
    Mid-size businesses use switches you can manage in a browser. Netgear product line manager Peter Newton expands.
  • The ten-minute guide to wireless security - part two
    Next, secure the clients, but which encryption scheme to use? Stage two - encrypt all traffic using WEP or WPA.
  • The ten-minute guide to wireless security - part one
    Before switching on a new wireless access point, make sure you're not unwittingly setting up a radio station for your company's most intimate secrets.
  • Best practices in network acceptable-use policies
    Users can be a problem, so make sure they know what they can and can't do on the network - and why.
  • Desktop Linux: If we build it, will they come?
    The Linux desktop remains elusive -- only now does it seem to be approaching the tipping point. Where is desktop Linux at the moment?
  • Obsolete defined
    Why does the IT industry abandon technology that users are happy with? You think you know why -- but do you?
  • The five fallacies of endpoint security
    Before dismissing this as another round of marketing jargon, consider this: the endpoint proponents might have a point.
  • Planning scenarios for Vista
    With Vista in view, we've looked at desktop operating system migration from very close up and from the long view.
  • Who's afraid of Skype?
    It's been described as the cutting edge of application aggression. To some companies that sounds like a problem in the making.
  • The closely observed network
    The day when companies record everything employees do at their PCs is not that far away. But what would such a system look like?
  • The uncertain future of the desktop
    You've spent a good part of your time off this winter with technology -- such as managing it for your your family and friends. That's the future.
  • Free is good for VMware
    VMware's decision this week to give away betas of a new product, VMware Server, generated raised eyebrows but little annoyance. So what does it mean?
  • The Pentium Chronicles
    It was Intel's most important chip and its descendants are still with us today. A new book from the chief architect looks at the heat it generated inside the company.

top | older >>