As mobile devices flood the workplace, the need to safely and effectively manage this logistical thicket fuels a rapidly growing market. Jeff Goldman details the...
With the rise of mobile computing, handheld devices are a lucrative new area for hackers. Protect your Android phone with these apps.
Thanks to the fact that the...
With hundreds of thousands of iPhone applications available in the App Store, it can be a challenge to find the right solution for a given issue. What...
There are several basic actions every iPhone user should take to make the device more secure, such as setting it to auto-lock after a specified period of...
For the past several months, the Finnish home improvement retailer Rautakesko has been using Wi-Fi RTLS solutions from Ekahau to capture key data on its customers’ shopping...
Obama’s and McCain’s policies regarding wireless technology and the Internet may not be front and center in media coverage of their campaigns, but their differences are worth...
Fonality has introduced version 3.0 of its HUD (Heads Up Display) unified communications client, not only for its commercial PBXtra and trixbox Pro offerings, but also for...
On July 15th of this year, without much fanfare, the IEEE published the final specification for IEEE 802.11r-2008, also known as Fast Basic Service Set Transition, an...
Seven years after the September 11th attacks, wireless technology is playing an increasingly central role in so-called "homeland security," with new deployments announced on a regular basis....
Municipal Wi-Fi networks may have been getting a bad rap lately, but citywide wireless networks deployed to support public safety – as opposed to public Internet access...
Manuel Kasper developed the embedded firewall software package m0n0wall back in 2002, he says, while experimenting with embedded x86-based computers. "Having just succeeded at stripping down FreeBSD...