Download the authoritative guide: Cloud Computing 2018: Using the Cloud to Transform Your Business
"Im a global nomad, a road warrior type of executive, who regularly travels and uses all types of technology to get my work done," said Abramson, who manages a staff of 15 employees, all of whom also work virtually. "My job takes me all over the world, either meeting with clients, or attending conferences and industry events."
Abramson, who also writes two blogs, Working Anywhere and VoIPWatch, decides which hotels, restaurants, and even resorts, he stays in based on Wi-Fi availability."Ive jumped on open hotspot networks when that was all that was available and have carried a Wi-Fi detector to find the open signals," he said.
Abramson has a T-Mobile account, and in a pinch when Wi-Fi isnt available, he has a 3G modem that he can insert either "Pay as You Go" or contracted 3G data SIM cards to make sure he gets online. Whether hes inside his hotel apartment in London or in the Virgin Lounge at Heathrow Airport, Abramson will find a way to get online. He carries an arsenal of mobile devices that allow him to connect: three mobile phones, (a Nokia, a BlackBerry, and his new Samsung), two laptops (Mac and PC), and an Internet Tablet from Nokia.
Dave Taylor, a Colorado-based blogger at AskDaveTaylor.com, also works from public hotspots, mainly at cafés, on a daily basis.
"Its much more fun than working from home," Taylor said. "Over time, many of my friends have also started working out of cafés. Well hang out and be social together even though we are all there working."
As mobile workers, Abramson and Taylor are part of a growing class of workersdubbed bedouins, after the nomadic Arabs who travel from place to place in the desertwho use café-based and other public hotspots to run their professional lives.
Eamonn Carey, from Dublin, Ireland, has spoken at conferences and trade shows about the bedouin lifestyle.
"It's a great life to have if you can make it work for you," said Carey, who runs Random Thoughts Media, a mobile and online video production company, and Fanscast.tv, a user-generated site connecting fans with their favorite bands, television shows, teams, and movies. "You're always mobile and you get to hang out in cool coffee houses or bars. As broadband speeds get faster, and as Wi-Fi becomes even more widespread, you'll see more people working like this, particularly in the creative industries, but hopefully in other industries as well."
Freelance Web designer Nathan Swartz of ClickNathan.com agrees.
"Were close to the point where it's really becoming less important to go into the office," he said. "When you have access to different types of technology, like e-mail, instant messaging, and cell phones, you can always get a hold of someone as easily as you could by walking down the hall."
Bringing in business
When Swartz began working out of cafés in Pittsburghs swank East End neighborhoods, he was a little paranoid and wondered whether he would be kicked out for being there too long. But he soon realized that café owners use Wi-Fi as an amenity to help bring people in.
"At first, I thought it was kind of weird to get free electricity and Wi-Fi all day," he said. "But if these places have a big 'Free Wi-Fi' sign outside and have numerous plug points all over the café, they probably want you in there. No one has ever told me that I should probably get moving, and Im always buying food and drinks from them during the day."
Taylor said that this arrangement is good for both café owners and bedouins.
"Since I recognize that this is an economic transaction, I buy stuff at their location," said Taylor, who can often be found at Amante, a hip, Italian café in Boulder, Colorado. "Ill have breakfast at one place and sit there for two hours, and then go somewhere else for lunch. Im giving them some revenue and I sometimes bring my friends in and also have meetings there."
On the road again
Richard Hoy and his wife, Angela, of Maine, dont have to worry about how much coffee or muffins they have to buy because they truly are bedouins, living nomadically from their RV for a couple months each year. Since 2004, they have been traveling all over the country, taking their print-on-demand business, Booklocker.com, along for the ride.
"Our business is entirely Internet-based," Richard Hoy said. "So, as long as we have a connection, we could run the business."
In 2004, Wi-Fi service penetration into campgrounds reached a level where it was practical for them to plot a cross-country trip.
"In addition, T-Mobile began offering flat-rate cellular data service," he said. "It wasn't very fast, maybe the speed of a 9600 baud modem to a 19.2 modem, but it was fast enough to do e-mail. And you could connect while flying down the freeway."
Now, since most campgrounds offer Wi-Fi, the Hoys look for sites that offer good Wi-Fi coverage. If that doesnt work, they have a few back-up plans.
"You always need a back-up," said Hoy. "Weve been to places where its not always as advertised. The problem with Wi-Fi in any kind of outdoor setting is that there's always signal interference if it has not been professionally installed."
The Hoys have a custom-built bridge/antenna rig that plugs into a wireless router inside their RV. This setup helps pull in weak Wi-Fi signals at campgrounds. About a year ago, they also invested in a satellite Internet setup for RVers from Maxwell Satellite, and later this spring they plan to purchase an iPhone. And if none of their back-up plans work, their last option is checking into a hotel with Wi-Fi capability or looking for nearby cafés.
No matter where you work, security is an absolute must for todays bedouins. With wireless connections, data typically is sent unencrypted through the air between the mobile device and an access point, making it easy for hackers to sniff the data from as far away as the parking lot.
"You are never in your whole life more vulnerable than when youre sitting in a public hotspot," said Daniel Hoffman, a senior systems engineer at Fiberlink Communications and author of "Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise." "If you don't have the proper security items in place, you'll never know when you're being hacked because the goal is that you don't know."
Some important security tips to keep in mind:
Equip your laptop with anti-spam, anti-spyware, and a personal firewall.
"Make sure that your antivirus and anti-spyware is running and is up-to-date," said Hoffman. "You also want a personal firewall so that person across the room cant attack you directly. That firewall component should have some kind of intrusion prevention capability to know that someone is trying to attack you and will stop them."
Hoffman said you want the same protection you put on your laptop as you would with your BlackBerrys and PDAs.
"There is antivirus software available for BlackBerry's and PDAs," he said. "There are also firewall applications as well."
Prepare for theft or loss.
Identity theft and personal security expert, Robert Siciliano, CEO of Boston-based IDTheftSecurity.com, often sees people in cafés get up to purchase another coffee or use the restroom, and leave their laptop on the table.
"Anyone who hangs out in a café all day sees numerous opportunities to steal laptops," he said.
Safeguard your data by implementing a password-protected screen lock, and don't store sensitive information, such as usernames, passwords, Social Security numbers, bank account numbers, or credit card numbers on the device. Also, be sure to keep data backed up on a PC or server in case your mobile device is gone forever.
Siciliano recommends that laptop users invest in services such as MyLaptopGPS.com.
"This is a tracking software installed in your laptop that when stolen, will silently remove all data from your machine and let you know where the device is via your Internet-based GPS," he said. "Law enforcement can then retrieve your machine and arrest the thief."
Implement a form of end-to-end encryption.
Ensure that your e-mail login and e-mail transfer use SSL (Secure Sockets Layer) encryption. If not, hackers can read your e-mails.
"Make sure you are using secure connections when connecting to your e-mail," said Dave Tremel, President of Cranberry Technology Solutions in Cranberry Township, PA. "If it's corporate e-mail, make sure you are using a VPN connection. If you are using Gmail, Yahoo! or any other Web-based e-mail, make sure you are using the secure login option. This is the default on most services, but not all."
Know where you are connecting.
A favorite way for hackers to access your laptop data is by setting up what is known as an "evil twin," according to Siciliano.
"This is a known hack where an identity thief sets up a wireless access point where you may connect to thereby filtering all your data through their network," said Siciliano. "They may even set up a network calling themselves T-Mobile. If you connect, look for SSL certificates (https) to distinguish the real from the fake." [For more on evil twins, read When Free Public Wi-Fi is Bad.]
Another way to protect your data is to disable all file and printing sharing options.
"If you do have to enable file and printer sharing make sure you have a password on your laptop when you log in and you have disabled the guest account," Tremel said. "You don't want someone coming along and downloading all of your files."
In addition to safeguarding your data, there are a few other basic tips for those who want to lead a bedouin lifestyle. If you want a faster connection, Tremel advises mobile workers to maximize their connection speed by sitting closer to access points.
"The farther you are away from the access point, the slower your connection is going to be," he said. "Depending on the size of the location there could be several access points. Your best bet is to sit in a central location because this will give you the best option of having a good signal which will provide the best transfer rate."
If you cant acquire a good signal, Tremel recommends asking where the access point is or walking around with your laptop until you get a good signal.
When surfing the Internet, Taylor urges bedouins to respect the business whose space you are using.
"Dont download illegal software or otherwise jeopardize the hospitality of the café you are at," Taylor said.
Working nomadically can be draining at times, so social interaction is important.
"It can be slightly odd if the only person-to-person contact you have is with your bus driver or waiter or waitress," said Carey. "Arrange to meet friends or colleagues for lunch at least once or twice a week. Make an effort to meet people for occasional normal human interactions, and trust me, you'll feel energized afterwards."
Finally, Carey added that bedouins should choose different cafés to work from.
"Don't just pick your local Starbucks and go there all the time," he said. "Variety is the spice of life. Think of this as having a dozen different offices. Find cool bookshops or bars that have hotspots and hang out there from time to time. The change of scene might be an inspiration."
Daniel Casciato is a freelance writer from Pittsburgh, PA. In addition to writing for Wi-FiPlanet, he writes legal, medical, real estate and technology-related articles for trade and consumer publications and recently launched his own copywriting business. For more information, visit www.danielcasciato.com.
This article was first published on WiFiPlanet.com.