Wireless networking
Wireless networking has freed IT users from the confines of their desk and the wired network. Technologies such as 802.11 Wi-FI, Bluetooth and even satellite links have opened up new opportunities for IT innovation. We analyse the latest trends and technologies.
- 
				News
					29 Oct 2025
					
									
										  E.ON taps Nokia for comms network modernisationFive-year deal sees energy supplier deploy network service across optical, IP and fibre domains, laying the foundations for future advancements, including support for sustainability goals in quantum-safe networks Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
				News
					29 Oct 2025
					
									
										  Extreme lands enterprise Wi-Fi 7 winsAI-powered networking automation firm reveals number of significant deployments of services based on latest wireless comms standard Continue Reading By- Joe O’Halloran, Computer Weekly
 
- 
                News
                08 Aug 2007
                  Wi-Fi simplicity edging out Wi-Fi securityExperts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading By- Eric Parizo, Senior Analyst
 
- 
                News
                08 Aug 2007
                  WLANs require investment to yield benefits, study saysWLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading By- Andrew R. Hickey
 
- 
                News
                08 Aug 2007
                  WLANs require investment to yield benefits, study saysWLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading By- Andrew R. Hickey
 
- 
                News
                25 Jul 2007
                  Cisco issues warning for wireless LAN controller flawsCisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                News
                19 Jul 2007
                  Wireless interference can be frustrating (and fun?)Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one wireless network, can have a strong impact. Continue Reading By- Andrew R. Hickey
 
- 
                News
                29 Apr 2007
                  WEP: Wireless security's broken skeleton in the closetWEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Continue Reading By- Andrew R. Hickey
 
- 
                Tip
                23 Apr 2007
                  What can we do to connect our wireless router to our wireless client?Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                04 Apr 2007
                  Wireless VoIP market to grow rapidlyVoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading By- Kate Dostart, Associate Editor
 
- 
                Tip
                28 Mar 2007
                  How do I get my LAN computers to reach the Internet?Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                Tip
                28 Mar 2007
                  What are the criteria for evaluating an indoor wireless network?In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                22 Mar 2007
                  11n will boost speed, prompt upgrades802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading By- Andrew R. Hickey
 
- 
                News
                11 Mar 2007
                  Wi-Fi interferenceIn this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs. Continue Reading 
- 
                Feature
                01 Mar 2007
                  Black Hat RFID controversy has bloggers up in armsThis week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading 
- 
                News
                28 Feb 2007
                  RFID cloning presentation moves forward despite legal threatsChris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading 
- 
                Feature
                28 Feb 2007
                  RFID dispute: Vendors still hostile toward full disclosureMany vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading 
- 
                News
                27 Feb 2007
                  Black Hat presenter nixes RFID cloning demo under pressureA demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                Feature
                10 Jan 2007
                  WiMax clearing path to mainstreamA number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading 
- 
                News
                18 Dec 2006
                  Cisco WLAN design best practicesWireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community considerations, controller architecture and access point placement Continue Reading By- Robbie Harrell
 
- 
                Tip
                18 Dec 2006
                  What are the fundamentals of ATM and ISDN?Lisa Phifer explains the fundamentals of ATM and ISDN and why they are used. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                11 Dec 2006
                  SIP desktop phone blends functionality, styleVoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading By- Andrew R. Hickey, Senior News Writer
 
- 
                Tip
                03 Dec 2006
                  Access your ISA and Exchange Server from outside the officeLearn how to configure your Linksys router so that you can access your ISA and Exchange Server from outside the office in this expert response by Lisa Phifer. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                28 Nov 2006
                  Effective wireless security is available, but holes existSpecialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it. Continue Reading By- Krissi Danielsson, Contributor
 
- 
                Tip
                22 Nov 2006
                  Wireless connections with ad hoc networksAd hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Continue Reading By
- 
                News
                30 Oct 2006
                  Wireless network security testingThe abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading By- Kevin Beaver, Principle Logic, LLC
 
- 
                Feature
                17 Oct 2006
                  Nokia E62 thin mobile productivity deviceIn this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading 
- 
                Tip
                15 Oct 2006
                  Creating a WPA2 compliant networkOur expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                Tip
                15 Oct 2006
                  High-gain antennas and the near field effectIn this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                Tip
                15 Oct 2006
                  Wireless connection in the wildernessLisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                15 Oct 2006
                  Flaw found in Toshiba wireless device driverAttackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. Continue Reading By
- 
                News
                03 Oct 2006
                  Cisco, Cognio team up on Wi-Fi interference detectionCisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading By- Andrew R. Hickey
 
- 
                News
                03 Oct 2006
                  Cisco, Cognio team up on Wi-Fi interference detectionCisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading By- Andrew R. Hickey
 
- 
                News
                14 Sep 2006
                  Set up an ad hoc WiFi networkWhat if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; the capability to do this is built right in XP. Continue Reading By- Rahul Shah
 
- 
                News
                06 Sep 2006
                  VoIP startup untethers would-be mobile workers from wireline office phonesVoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading By- Amanda Mitchell, News Editor
 
- 
                News
                05 Sep 2006
                  ControlGuard targets rogue devicesControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading By- Harris Weisman, Contributing Writer
 
- 
                Feature
                04 Sep 2006
                  Protecting wireless networks: Step 3Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading 
- 
                Feature
                04 Sep 2006
                  Protecting wireless networks: Step 2Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading 
- 
                Feature
                04 Sep 2006
                  Wireless network security testingAttack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading 
- 
                Tip
                20 Aug 2006
                  Secure network against illegal usersLisa Phifer gives advice on how to handle illegal users on a network. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                14 Aug 2006
                  Wireless security boost for laptops outside the office>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Continue Reading By- Andrew R. Hickey
 
- 
                News
                02 Aug 2006
                  RFID security issues are cause for corporate concernAlthough small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business benefits. Continue Reading By- Tim Scannell, TechTarget
 
- 
                News
                26 Jul 2006
                  Blue Cross bears burden of 'no wireless' policyBlue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading By- Andrew R. Hickey, News Writer
 
- 
                News
                28 Nov 2005
                  Step 6: Configuring wireless clientsWith wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading 
- 
                News
                21 Nov 2005
                  Wireless security: Public Wi-Fi could open security holesA Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading By
- 
                News
                20 Nov 2005
                  Wireless security crucial to railway safetyA transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading By
- 
                News
                16 Nov 2005
                  Wireless security: Companies deal with software updatesA health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading By
- 
                News
                05 Sep 2005
                  Extending perimetersThe news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading 
- 
                News
                11 May 2005
                  A new era of computer worms: Wireless mobile wormsIn this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading 
- 
                Feature
                15 Apr 2005
                  The acceptable rules of the mobile gameMobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading 
- News 08 Mar 2005
- 
                News
                01 Dec 2004
                  Phreaks love BluetoothBluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Continue Reading By
- 
                News
                23 May 2004
                  Hacking for Dummies: Chapter 10 -- Wireless LANsRead Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading 
- 
                Feature
                13 Nov 2003
                  How to secure a wireless LanStuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan... Continue Reading By- Stuart Okin and Ian Hellen
 
- 
                News
                15 Nov 2000
                  Wap usage: Planes, phones and automobiles
 
 So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate... Continue Reading
- 
                Feature
                01 Nov 2000
                  Tags take on the barcodeRadio frequency tags could be the technology that kills off the barcode. Bill Goodwin explains how they work and what is holding... Continue Reading By- Bill Goodwin, Investigations Editor
 
- Feature 12 Jul 2000

 
		