Along with the potential performance and coverage benefits of 802.11n come a few new security risks, says industry security guru Joshua Wright. Wright presented a Webinar last week that outlined several new vulnerabilities that high-speed 802.11n networks introduce.
Stories by Joanie Wexler
There is much buzz about enterprise access networks going "all wireless" as the increased throughput and range of next-generation 802.11n wireless LANs become available in IEEE-standard products.
Would you consider using a cellular data network service as a last-mile access alternative in small or temporary locations? If so, check with your carrier about the conditions under which this is allowed.
Many companies have successfully used leaky coax as a distributed antenna system, or DAS, for boosting cellular voice signals throughout their organisations. You might be wondering if you can also use it to propagate Wi-Fi signals for improved coverage.
Stand-alone processes and networks that hail from the industrial, manufacturing, and facilities sides of the business are destined to merge onto the IT infrastructure.
The convergence of mobile networks and devices could extend coverage and simplify access, but loose ends linger.
There are many emerging applications that involve tracking the whereabouts of a person or object in a wireless network. Among them are security, emergency response, asset management, and real-time contact applications.
It has been widely reported that 802.11n, the wireless LAN IEEE draft standard that uses multiple input/multiple output technology to boost Wi-Fi speeds to over 100Mbps, is "backward compatible" with today's 802.11a, 11b, and 11g networks. This can seem confusing, given that 802.11a, which runs in the 5-GHz frequency band, is not compatible with 802.11g and 11b, which operate in the 2.4-GHz band.
Now that the broadband wireless industry can boast some bona fide WiMAX Forum-certified products - with several more on deck for certification testing - will WiMAX services suddenly proliferate as an enterprise-class, last-mile access alternative?
How do you strike a successful balance of in-house and outsourced IT expertise?
Despite the recently announced US$21 million sale of its assets to Moseley Associates, Proxim intends to introduce an appliance this week that brings its product line in sync with centralized wireless LAN management architectures.
I shuddered not once, but twice during a recent local newscast that demonstrated how a mere fingerprint scan will soon replace an ATM or credit card swipe for the purchase of goods and services.
How do you know that you've covered all the bases when it comes to wireless LAN security?
Bluetooth and ZigBee have much in common. Both are types of IEEE 802.15 "wireless personal-area networks," or WPANs. Both run in the 2.4-GHz unlicensed frequency band, and both use small form factors and low power.
When Erlanger Health System began deploying VoIP technology in 2002, it wanted to simplify and lower the cost of moving phones when employees changed locations.
- Front End Developer NSW
- General Manager - Security, Risk & Compliance NSW
- Applications Packager NSW
- IP Network Engineer NSW
- Business Analyst - Payments VIC
- Test Specialist - eCommerce VIC
- Senior Technical Business Analyst VIC
- Program Manager - Telco O2A VIC
- Information Security Consultant QLD
- Reporting Analyst/Workforce Analyst - Telco VIC
- Upskill your Team. Transition your Career. Cyber Security Foundation & Practitioner™ instructor-led course, for anyone needing a solid understanding of Cyber Security.
- Business transforms when it comes together | Unite your IT , Ops, and Applications teams with shared solutions. Get Ready - Red Hat Cloud