Wireless networking
Wireless networking has freed IT users from the confines of their desk and the wired network. Technologies such as 802.11 Wi-FI, Bluetooth and even satellite links have opened up new opportunities for IT innovation. We analyse the latest trends and technologies.
-
E-Zine
13 Oct 2023
CW EMEA: Prepare for AI explosion
In this month’s CW EMEA, we look at generative artificial intelligence, which Accenture claims is the next big thing in enterprise IT. The IT services giant says GenAI will transform 40% of all working hours – and it is putting its money where its mouth is with plans to invest $3bn in AI and create 40,000 AI-focused roles. Part of the huge investment has already been assigned to the creation of an AI and generative AI lab in Brussels focused on the public sector in Europe. We also look at a Deutsche Telekom-led consortium’s demo of multi-supplier non-real-time RAN optimisation, how last month’s Ryder Cup tested out technology to improve how fans digitally consume the event, and find out how Zurich Insurance has cut the time it takes to complete development of ServiceNow applications. Read the issue now. Continue Reading
-
News
28 Sep 2021
Dutch IT firm transforms HR policy built on lessons from pandemic
Software firm rips up human resources rule book and replaces it with a hybrid working policy Continue Reading
-
Tip
04 May 2011
Your enterprise wireless LAN questions answered
Got wireless LAN questions? Our expert has solutions to 802.11n migration, wireless LAN troubleshooting and mesh network design. Continue Reading
-
E-Zine
01 May 2011
Wired and wireless: Can you achieve an integrated network?
This European edition of Network Evolution E-Zine discusses the myths surrounding integrated wired and wireless LANs, security considerations, and wireless and mobile technology trends the UK should be on the lookout for. Continue Reading
-
Tutorial
28 Apr 2011
Wireless LAN authorisation guide: Controlling users and their devices
As wireless LANs become core access technology, it is crucial to implement WLAN access control that manages both corporate and personal devices, as well as Wi-Fi embedded clients. Continue Reading
-
News
15 Apr 2011
Computer Weekly marks the end of an era as a new one begins
The first issue of Computer Weekly magazine in 1966 marked the start of an era in the UK IT industry - the first ever weekly technology publication. This is the story of how it all began. Continue Reading
By- Cliff Saran, Managing Editor
-
Photo Story
04 Apr 2011
How pay-as-you-behave technology could transform car insurance
New IT systems can help calculate unique insurance premiums based on driver behaviour Continue Reading
-
News
01 Apr 2011
Community networks to be part of Devon and Somerset broadband projects
Devon and Somerset county council has issued requests for tenders worth... Continue Reading
By -
News
01 Apr 2011
Samsung and Visa team up for mobile NFC payments
Samsung and Visa have formed a partnership to provide mobile payments in time for the 2012 London Olympic games. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
25 Mar 2011
UK wireless technology trends: Enterprise tablets take hold
What's next in wireless technology trends? IMS Research analysts predict enterprise tablet adoption, as well as growth in Near Field Communication, Wi-Fi Direct and M2M communication for businesses. Continue Reading
By- Tracey Caldwell, Contributor
-
News
07 Mar 2011
Intel launches second generation Core vPro processor
Intel says new chip will increase the speed of business applications by 60% Continue Reading
By- Kathleen Hall, TechTarget
-
News
25 Feb 2011
Huawei asks US to investigate it for threats to national interest
Huawei, the Chinese telecoms equipment maker, has called for the US government to make a formal investigation of the company to lay to rest allegations that it represents a threat to US national interests. Continue Reading
By -
News
11 Feb 2011
Enterprise mobile computing spurs change in UK networking trends
A driving demand for enterprise mobile computing devices and applications is driving a shift toward unified wired and wireless networking in the UK networking industry, according to HP Networking UK chief Barry Bonnett. Continue Reading
-
News
02 Feb 2011
O2 to apply for e-money licence to support NFC payments
O2 will apply for an e-money licence this year, signalling its commitment to support contactless payments in the UK in the near future. Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
01 Feb 2011
Interactive crime map site experiencing problems as millions log on
An interactive crime map has been launched to allow people to monitor criminal activity in their area. Continue Reading
By- Kathleen Hall, TechTarget
-
News
28 Jan 2011
Tesco rolls out in-store mobile phone network
Supermarket Tesco is rolling out a converged fixed and mobile voice network across its stores based on GSM technology. Cliff Saran finds out how the rollout is progressing. Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Jan 2011
Sky buys The Cloud
BSkyB has confirmed plans to acquire UK Wi-Fi network provider The Cloud. The deal allows the broadcaster access to 5,000 public wireless hotspots Continue Reading
By- Bryan Glick, Editor in chief
-
News
24 Jan 2011
Bluwan's FTTA promises cheap high-speed comms
Start-up French wireless comms company Bluwan has previewed microwave technology that promises to slash the cost of providing high-speed broadband to rural areas to between 2% and 5% of traditional microwave and fibre networks. Continue Reading
By -
News
24 Jan 2011
McDonald's to roll out contactless payments in 1,200 UK stores
Fast-food restaurant chain, McDonald's, will roll out contactless payments in all of its 1,200 UK stores by the end of October Continue Reading
By- Jenny Williams, University of Gloucestershire
-
News
11 Jan 2011
BT to develop Goonhilly satellite site for deep space comms programme
After closing the Goonhilly visitor's centre in March 2010, BT has announced it is planning to invest in the historic telecommunications satellite site. Continue Reading
By- Cliff Saran, Managing Editor
-
News
05 Jan 2011
BCS CEO David Clarke talks about the future of the IT industry
David Clarke, CEO of the chartered institute of computing the BCS, talks to Computer Weekly about being awarded an MBE, the future of the IT profession and tackling a membership revolt against his leadership last year. Continue Reading
By- Kathleen Hall, TechTarget
-
Photo Story
10 Nov 2010
Unified Comms for the smaller business
Bob Tarzey from Quocirca looks at how smaller businesses can benefit from deploying unified communications Continue Reading
By -
Photo Story
23 Jul 2010
British Airways launches mobile phone apps
BA has launched apps for iPhone, Android and Blackberry mobile devices to allow mobile check-in and travel updates to passengers Continue Reading
-
Photo Story
29 Jun 2010
Microsoft Home explores future uses of technology
The Microsoft Home explores technology that might enhance life at home in the next five to ten years. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jun 2010
PRIMER: WiFi sniffers
Learn about WiFi sniffers, how they operate, how they can help to manage your WLANs and why Google is far from alone in its use of the technology. Continue Reading
By- Richard Chirgwin
-
Photo Story
06 Nov 2009
Photos: An Apple iPhone app for everyone
To celebrate the availability of 100,000 apps on the Apple App Store, we have compiled a list of apps with something for everyone Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
01 Oct 2008
Using iPerf to measure WLAN performance
Learn how to measure TCP/UDP, throughput, loss and delay with iPerf, an open source network testing tool. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
12 Aug 2008
How do I increase network signal strength over a large distance?
Want to build a WLAN that covers a large area? Lisa Phifer explains that you'l need mutiple access points and clever use of antennae. Continue Reading
By- Lisa Phifer, Core Competence
-
News
15 Jul 2008
Linksys WAP2000 Business Access Point: Review and configuration
Our labs run their eyes over Linksys' new WAP 2000, a VoIP and WLAN router for small businesses. Continue Reading
By- SearchNetworking.com.au staff
-
Tip
12 Jun 2008
What are the best methods for handling rogue access points?
Michael Gregg explains how to enforce network policy and handle rogue access points (APs) in this expert response. Continue Reading
By- Michael Gregg, Superior Solutions, Inc.
-
News
29 May 2008
Cisco smartens up the wireless network with Motion platform
Cisco will soon release a new product that integrates wireless devices and wired networks to enable seamless handovers and uninterrupted data access. Continue Reading
By- Michael Morisy, TechTarget
-
News
20 May 2008
What is 802.11n "Greenfield" mode?
802.11n has a special facility called "Greenfield" mode to help it increase speed. Continue Reading
By- Lisa Phifer, Core Competence
-
News
13 Mar 2008
Wireless security protocols -- How WPA and WPA2 work
WPA and WPA2 improve upon WEP's encryption methods for better 802.11 wireless security. Continue Reading
By- David B. Jacobs
-
News
24 Feb 2008
Six steps to create a wireless LAN
Wireless LANs are deceptively simple to create. Follow our guide to ensure your WLAN has perfect coverage, can handle your applications and is easy to manage. Continue Reading
By- Yuval Shavit
-
News
17 Feb 2008
Introduction to wireless networks - from "The book of wireless"
Learn about the standards and specifications that control wireless networks and explains how data moves through the network from one computer to another. Continue Reading
By- No Starch Press
-
Tip
10 Jan 2008
Understanding 802.11n wireless antennas
Learn how 802.11n wireless antennas increase network footprint, available bandwidth and resilience to problems that crippled older 802.11a/b/g access points. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
19 Nov 2007
Wi-Fi linked to childhood autism
A study published this week in the Australasian Journal of Clinical Environmental Medicine warns that wireless communication technology may be responsible for accelerating the rise in autism among children. Continue Reading
-
News
15 Nov 2007
Wireless LAN performance
Benchmarking your wireless LAN performance is tricky. This tip examines key issues and offers advice for effectively measuring your WLAN performance. Continue Reading
-
News
05 Nov 2007
Google announces open source operating system for smartphones
After months of speculation, Google has officially announced Android, an mobile devices OS it's developing in partnership with a wide variety of companies. Continue Reading
By -
News
01 Nov 2007
ISCSI storage gets performance makeover
Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products. Continue Reading
By- SearchStorage.com Staff
-
News
23 Oct 2007
How to manage mobility
Planning a new mobility deployment? This tip and podcast offer eight strategies to make sure you get it right. Continue Reading
By- Simon Forge
-
News
20 Sep 2007
Wireless troubleshooting
Wireless network troubleshooting basics are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
19 Sep 2007
802.11 protocols
802.11 wireless protocols and deployment basics are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
18 Sep 2007
Cisco to acquire Cognio
Cisco will acquire wireless spectrum analysis and management vendor Cognio in a deal that will give Cisco a leg-up on wireless and mobility. Continue Reading
By- Andrew R. Hickey
-
News
18 Sep 2007
Wireless security
Wireless security and polices are covered in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
17 Sep 2007
Wireless network deployment and management
Wireless network deployment and management are discussed in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
17 Sep 2007
Wireless access points
The basics of wireless access point (AP) as well as configuration and placement are covered in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
News
16 Sep 2007
Wireless protocols learning guide
Wireless technologies including 802.11, WLAN and Wi-Fi defined in this guide. Continue Reading
By- SearchNetworking ANZ Staff
-
Feature
06 Sep 2007
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment is a significant step toward interoperability and seamless mobile connectivity between private WLANs and public wireless and cellular networks. Continue Reading
-
News
04 Sep 2007
Cisco goes next generation with 802.11n
Cisco today released 802.11n WLAN gear, as wireless experts predict the technology will soon kill the need for wired Ethernet LAN access. Continue Reading
By- Andrew R. Hickey
-
News
02 Sep 2007
Wireless network security: Controlling secondary connections
Secondary connections are the latest threat to corporate wireless networks and require more than password protection to remain secured. Continue Reading
By- Professor Michel Cukier
-
News
23 Aug 2007
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
17 Aug 2007
Voice over WLAN improves a hospital's communications
A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee satisfaction. Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
09 Aug 2007
Upcoming wireless standards promise managed WLANs
Learn about two new IEEE standards, 802.11k and 802.11v, which aim to improve wireless the problems over overlapping wireless networks, in this tip. Continue Reading
By- David Jacobs
-
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
08 Aug 2007
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
By- Andrew R. Hickey
-
News
08 Aug 2007
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
By- Andrew R. Hickey
-
News
25 Jul 2007
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Jul 2007
Wireless interference can be frustrating (and fun?)
Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one wireless network, can have a strong impact. Continue Reading
By- Andrew R. Hickey
-
News
29 Apr 2007
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Continue Reading
By- Andrew R. Hickey
-
Tip
23 Apr 2007
What can we do to connect our wireless router to our wireless client?
Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem. Continue Reading
By- Lisa Phifer, Core Competence
-
News
04 Apr 2007
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading
By- Kate Dostart, Associate Editor
-
Tip
28 Mar 2007
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
28 Mar 2007
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
22 Mar 2007
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading
By- Andrew R. Hickey
-
News
11 Mar 2007
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs. Continue Reading
-
Feature
01 Mar 2007
Black Hat RFID controversy has bloggers up in arms
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading
-
News
28 Feb 2007
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
-
Feature
28 Feb 2007
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
News
27 Feb 2007
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
10 Jan 2007
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading
-
News
18 Dec 2006
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community considerations, controller architecture and access point placement Continue Reading
By- Robbie Harrell
-
Tip
18 Dec 2006
What are the fundamentals of ATM and ISDN?
Lisa Phifer explains the fundamentals of ATM and ISDN and why they are used. Continue Reading
By- Lisa Phifer, Core Competence
-
News
11 Dec 2006
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
Tip
03 Dec 2006
Access your ISA and Exchange Server from outside the office
Learn how to configure your Linksys router so that you can access your ISA and Exchange Server from outside the office in this expert response by Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
28 Nov 2006
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it. Continue Reading
By- Krissi Danielsson, Contributor
-
Tip
22 Nov 2006
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Continue Reading
By -
News
30 Oct 2006
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Feature
17 Oct 2006
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
Tip
15 Oct 2006
Creating a WPA2 compliant network
Our expert, Lisa Phifer, goes through the basic principles of creating a WPA2 compliant network. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Oct 2006
High-gain antennas and the near field effect
In this response, Lisa Phifer explains the use of a high-gain antenna and what the near field effect is. Continue Reading
By- Lisa Phifer, Core Competence
-
Tip
15 Oct 2006
Wireless connection in the wilderness
Lisa Phifer explains how to connect office buildings wirelessly where laying cable is not an option due to trees and rocky terrain. Continue Reading
By- Lisa Phifer, Core Competence
-
News
15 Oct 2006
Flaw found in Toshiba wireless device driver
Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines. Continue Reading
By -
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
By- Andrew R. Hickey
-
News
03 Oct 2006
Cisco, Cognio team up on Wi-Fi interference detection
Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network. Continue Reading
By- Andrew R. Hickey
-
News
14 Sep 2006
Set up an ad hoc WiFi network
What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; the capability to do this is built right in XP. Continue Reading
By- Rahul Shah
-
News
06 Sep 2006
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
By- Amanda Mitchell, News Editor
-
News
05 Sep 2006
ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
By- Harris Weisman, Contributing Writer
-
Feature
04 Sep 2006
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Tip
20 Aug 2006
Secure network against illegal users
Lisa Phifer gives advice on how to handle illegal users on a network. Continue Reading
By- Lisa Phifer, Core Competence
-
News
14 Aug 2006
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Continue Reading
By- Andrew R. Hickey
-
News
02 Aug 2006
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business benefits. Continue Reading
By- Tim Scannell, TechTarget
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
28 Nov 2005
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
News
21 Nov 2005
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
By -
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
By -
News
16 Nov 2005
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
By -
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
11 May 2005
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm. Continue Reading
