Datamation Logo
Home
Authors
Posts by Lisa Phifer
thumbnail Lisa Phifer

Lisa Phifer

802.11: Better, Stronger, Faster–and Greener

802.11: Better, Stronger, Faster–and Greener

Mobile
October 1, 2008

After a full year of draft 802.11n deployment, we’ve reached the point where all major technical challenges have been resolved and enterprise WLANs run as well-oiled machines—right?   Of course not. Although Wi-Fi products and networks that incorporate them have clearly matured, IEEE 802.11 standards remain a work-in-progress.   Last Friday, I had the privilege […]

VoIP Security: SIP�Versatile but Vulnerable

VoIP Security: SIP�Versatile but Vulnerable

Networks
May 28, 2008

As a mission critical service, VoIP deployments require careful assessment to identify and eliminate security vulnerabilities in VoIP clients, applications, and infrastructure. But what exactly should you hunt for? Let’s explore a few security cracks commonly found in VoIP products that use SIP. Something old, something new Many VoIP handsets and softphones use SIP signaling […]

VoIP Security: SIP Versatile but Vulnerable

VoIP Security: SIP Versatile but Vulnerable

Networks
May 19, 2008

As a mission critical service, VoIP deployments require careful assessment to identify and eliminate security vulnerabilities in VoIP clients, applications, and infrastructure. But what exactly should you hunt for? Let’s explore a few security cracks commonly found in VoIP products that use SIP. Something old, something new Many VoIP handsets and softphones use SIP signaling […]

Guide to Hotspot Safety

Guide to Hotspot Safety

Mobile
January 18, 2008

Many consumers realize that hotspots can be risky, but fail to take even the most basic precautions. Why? Some underestimate the dangers, while others lack the financial and IT support enjoyed by corporate users. Fortunately, anyone can protect himself or herself by taking a few simple, cost-free steps. Don’t talk to strangers You rarely know […]

Double Duty: Quality Voice without Data Starvation

Double Duty: Quality Voice without Data Starvation

Mobile
September 28, 2007

As enterprises deploy VoIP, vendors are being challenged to provide toll-quality voice and predictable data delivery using shared WLAN infrastructure.  While prioritization helps, WLAN architecture and AP engineering can also make a huge difference.   According to Paul Curto, Senior Technical Marketing Engineer at Meru Networks, “For customers who are deciding amongst enterprise WLAN vendors, […]

Safety Net: Aruba Promotes Video Surveillance over Wi-Fi

Safety Net: Aruba Promotes Video Surveillance over Wi-Fi

Mobile
September 26, 2007

From terrorist attacks to school shootings, tragedies repeatedly demonstrate the need for public safety readiness.  One critical component: helping first responders see perpetrators and their actions.  Government-operated cameras are widely deployed along city streets and interstate highways, while many private organizations are building their own surveillance networks.  IP video cameras sales are expected to grow […]

Cisco Dives into the Draft 802.11n Pool

Cisco Dives into the Draft 802.11n Pool

Mobile
September 10, 2007

The trickle of draft 802.11n products completing Wi-Fi certification gained momentum last week with Cisco’s Next Generation 802.11n Wireless announcement. The splashy new Aironet 1250 Series AP, available with 2.4 and 5 GHz radio modules that comply with 802.11n draft 2.0, will ship this October. Expanding the Unified Wireless Network family Cisco’s next-generation offering is […]

Wi-Fi SideJacking opens eyes at BlackHat

Wi-Fi SideJacking opens eyes at BlackHat

Security
August 16, 2007

Unless you’ve been hiding in a cave for years, you know that everything sent over Wi-Fi is vulnerable to eavesdropping. A handful of hotspots now encrypt user data—usually with WPA—but the vast majority still expect customers to protect themselves. Sadly, many users continue to ignore even this simple threat. Those who know better often defend […]

Muni Wi-Fi Pitches In after Twin Cities Bridge Collapse
Mobile Security: Where Risk Meets Opportunity, Part 3

Mobile Security: Where Risk Meets Opportunity, Part 3

Mobile
July 31, 2006

Smartphones and PDAs have grown more capable and connected, but many mobile professionals use these devices without protecting the data they store and send. ISPs can offer mobile security products and services to help subscribers mitigate these risks. In Part 1 of this series, we introduced common mobile device capabilities. In Part 2 of this […]

Page 2 of 3
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Advertisers

Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.

Advertise with Us

Our Brands


Privacy Policy Terms & Conditions About Contact Advertise California - Do Not Sell My Information

Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.