Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

WIRELESS ACCESS

Topic Zone

Latest News

Latest Features

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • 7 sneak attacks used by today's most devious hackers

    Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users

  • Oracle Team USA America's Cup boat looks for high tech advantage

    Forget the fastest sail boat; next year's America's Cup could come down to who has the fastest computer.

  • Will the sky fall if you don't deploy IPv6?

    Will the world end if you don't deploy IPv6? Will the internet grind to a screeching halt? Will your computer systems disintegrate into a pile of bits and bytes? In short, no. At least not yet. But you may want to consider a few things.

  • Six new and rising hacker threats

    Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.

  • The iPad 2 is the holy grail of tablet computing

    Eleven months ago, Apple released the first iPad, a touchscreen handheld computer that redefined tablets, disrupting the laptop/desktop market just as the iPod did to music players and the iPhone did to smartphones.

  • The future of wireless networking architecture

    With ever more devices needing greater throughput for video and voice content, today's wireless hub-and-spoke network architecture is showing its age. What's needed is a wireless LAN (WLAN) solution capable of greater intelligence at the network's edge to optimise traffic flow without compromising security or quality of service and driving up cost.

  • Five reasons to get an iPad over a Galaxy Tab

    The Samsung Galaxy Tab is the first tablet to come along that offers a serious alternative, or poses any notable challenge to the Apple iPad. As formidable as the Samsung tablet seems, though, there are still a number of reasons to forego the Android-based device in favor of the Apple iPad.

  • How to build a wireless network

    In the Wild West of mobility, you'll need to support all kinds of consumer devices that tap into your wireless network. How Bryant & Stratton College's CIO Ernest Lehman created a blueprint for a secure wireless network that could be rolled out to the campuses.

  • Despite Google Street Car incident, WiFi data collection continues

    Four months ago, amidst a backlash from government regulators and privacy advocates, Google stopped collecting WiFi data with its Street View cars. But that doesn't mean Google has stopped collecting wireless data altogether, and neither have other companies such as Apple.





Featured White Papers

BYOD and the Network Infrastructure

While most BYOD headlines focus on wireless access and mobile device management, network teams know there is much more to accommodating and managing BYOD than that. Everything about BYOD begins with network connectivity ? an IP address, a DHCP lease and a DNS record query ? but the network also must handle the dynamic requirements of personal devices to make sure they work like traditional desktops and laptops. Download this white paper to help you deal with all dynamic and critical networks challenges, including five common to BYOD.
Download whitepaper

The network impact of 802.11n

802.11n enables significant productivity benefits for mobile computing, while opening up new wireless applications.
Download whitepaper

Implementing Voice Over Wireless Networks

Voice over Wireless Fidelity (VoWi-Fi) presents wireless network designers with a difficult challenge because introducing high bandwidth wireless applications such as VoWi-Fi can cause wireless networks to suffer a loss of Quality of Service (QoS), and in many cases, fail.
Download whitepaper

Securing your network from the inside

When it comes to securing your network from internal threats, there are many steps you can take to pre-empt potential risks. First, understand the common causes of security threats; and, second, use the right tool to identify them. This paper will outline some of these causes and will explain why having the right tool can enable network professionals to quickly identify security threats ? keeping your network ? and users ? safe.
Download whitepaper

Securing your network from the inside

This paper will outline some of these causes and will explain why having the right tool can enable network professionals to quickly identify security threats ? keeping your network ? and users ? safe.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map