42 Results for:PDA

  • Sort by: 

SIP desktop phone blends functionality, style

11 Dec 2006

VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Read More

Five steps to eliminate rogue wireless access

By Lisa Phifer 01 May 2009

Unauthorized wireless access points aren't always malicious. Learn how to distinguish between them and mitigate threats posed by rogue APs. Read More

VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec

By Lisa Phifer 31 Oct 2006

This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More

Wireless security: Companies deal with software updates

By Bill Brenner 16 Nov 2005

A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Read More

Service-oriented architecture: Realizing tangible benefit from SOA in the near term

19 Jul 2006

This introduction to service-oriented architecture (SOA) clarifies some basic terms, such as service and Web services, and provides an overview as to how your organization can begin to see benefits from SOA. Read More

Tips for manufacturing production planning and scheduling with MES

29 Sep 2009

MES software can aid in production planning by calculating automated sequences. It can also help on the work scheduling end through order processing. Read More

IP everything, essentially

21 Oct 2004

What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Read More

Personal information management: History and details

28 Jan 2008

Learn about personal information management and why managing personal information is especially important in today's data inundated world. Read More

Future mobile

By Antony Savvas 12 Jul 2000

Antony Savvas explores the future mobile network Read More

Detecting rogue mobile devices on your network

16 Jun 2008

Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to ... Read More