Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

WIRELESS ACCESS POINT

Topic Zone

Latest News

Latest Features

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Oracle Team USA America's Cup boat looks for high tech advantage

    Forget the fastest sail boat; next year's America's Cup could come down to who has the fastest computer.

  • Will the sky fall if you don't deploy IPv6?

    Will the world end if you don't deploy IPv6? Will the internet grind to a screeching halt? Will your computer systems disintegrate into a pile of bits and bytes? In short, no. At least not yet. But you may want to consider a few things.

  • The future of wireless networking architecture

    With ever more devices needing greater throughput for video and voice content, today's wireless hub-and-spoke network architecture is showing its age. What's needed is a wireless LAN (WLAN) solution capable of greater intelligence at the network's edge to optimise traffic flow without compromising security or quality of service and driving up cost.

  • How to build a wireless network

    In the Wild West of mobility, you'll need to support all kinds of consumer devices that tap into your wireless network. How Bryant & Stratton College's CIO Ernest Lehman created a blueprint for a secure wireless network that could be rolled out to the campuses.

  • Despite Google Street Car incident, WiFi data collection continues

    Four months ago, amidst a backlash from government regulators and privacy advocates, Google stopped collecting WiFi data with its Street View cars. But that doesn't mean Google has stopped collecting wireless data altogether, and neither have other companies such as Apple.

  • Burning Man's open source mobile phone system could save the world

    Today I bring you a story that has it all: a solar-powered, low-cost, open source cellular network that's revolutionising coverage in underprivileged and off-grid spots. It uses VoIP yet works with existing mobile phones. It has pedigreed founders. Best of all, it is part of the sex, drugs and art collectively known as Burning Man. Where do you want me to begin?

  • Stupid data centre tricks

    A university network brought to its knees when someone inadvertently plugged two network cables into the wrong hub. An employee injured after an ill-timed entry into a data centre. Overheated systems shut down after a worker changes a data centre thermostat setting from Fahrenheit to Celsius.

  • A simple guide to 802.1x networking security

    Understanding what the IEEE 802.1x standard is and why you should care means understanding three separate concepts: PPP, EAP and 802.1x itself.





Featured White Papers

Implementing Voice Over Wireless Networks

Voice over Wireless Fidelity (VoWi-Fi) presents wireless network designers with a difficult challenge because introducing high bandwidth wireless applications such as VoWi-Fi can cause wireless networks to suffer a loss of Quality of Service (QoS), and in many cases, fail.
Download whitepaper

Securing your network from the inside

When it comes to securing your network from internal threats, there are many steps you can take to pre-empt potential risks. First, understand the common causes of security threats; and, second, use the right tool to identify them. This paper will outline some of these causes and will explain why having the right tool can enable network professionals to quickly identify security threats ? keeping your network ? and users ? safe.
Download whitepaper

Securing your network from the inside

This paper will outline some of these causes and will explain why having the right tool can enable network professionals to quickly identify security threats ? keeping your network ? and users ? safe.
Download whitepaper

Meeting and exceeding PCI 1.1 compliance today

Visa, MasterCard, American Express, Diner?s Club, Discover, and JCB collaborated to create a new set of standards based on CISP (Cardholder Information Security Policy), and known as the Payment Card Industry Data Security Standard (PCI). All merchants and service providers that handle, transmit, store or process information concerning any of these cards, or related card data, are required to be compliant with PCI or face contract penalties or even termination by the credit card issuers.
Download whitepaper

Securing Your Network from the Inside: Adding a Portable Layer of Protection

When it comes to securing your network from internal threats, there are many steps you can take to pre-empt potential risks. First, understand the common causes of security threats; and, second, use the right tool to identify them. This paper will outline some of these causes and will explain why having the right tool can enable network professionals to quickly identify security threats ? keeping your network ? and users ? safe.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map