42 Results for:PDA
- Sort by:
SIP desktop phone blends functionality, style
11 Dec 2006VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Read More
Five steps to eliminate rogue wireless access
01 May 2009Unauthorized wireless access points aren't always malicious. Learn how to distinguish between them and mitigate threats posed by rogue APs. Read More
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
31 Oct 2006This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More
Wireless security: Companies deal with software updates
16 Nov 2005A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Read More
Service-oriented architecture: Realizing tangible benefit from SOA in the near term
19 Jul 2006This introduction to service-oriented architecture (SOA) clarifies some basic terms, such as service and Web services, and provides an overview as to how your organization can begin to see benefits from SOA. Read More
Tips for manufacturing production planning and scheduling with MES
29 Sep 2009MES software can aid in production planning by calculating automated sequences. It can also help on the work scheduling end through order processing. Read More
IP everything, essentially
21 Oct 2004What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Read More
Personal information management: History and details
28 Jan 2008Learn about personal information management and why managing personal information is especially important in today's data inundated world. Read More
Detecting rogue mobile devices on your network
16 Jun 2008Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to ... Read More