Amazon has reportedly been testing a Wi-Fi network that's based on new spectrum, from satellite network vendor Globalstar. The result: a much improved Wi-Fi experience.
An investigation by mobile security vendor Lookout warns that malware is being transformed into a large-scale, sophisticated software business, complete with customer support.
Even at CTIA, a trade show focused on core mobile networking hardware and software, you can find products that further the unwiring of work.
Google on Wednesday demanded that Microsoft yank its YouTube app for Windows Phone from the market and disable any downloaded copies of the app, according to Wired.com, which received a copy of Google's cease and desist letter.
Three years from now, tablet computers will outsell traditional Windows PCs, and do so by a whopping 72 percent, according to the latest projections from Gartner. In between, PC shipments drop at ever faster rates.
The FCC remains focused on rapidly expanding spectrum for licensed and unlicensed use, and encouraging both research and products that will let it be used more efficiently, according to the commission's boss.
The widespread use of personal smartphones is due partly to the fact they don't require extensive integration with IT infrastructures.
To handle the explosion of mobile devices in the enterprise, Dell this week unveiled plans for a server designed to automate a wide range of mobile management jobs for mid-range business customers.
In another blow to RIM's fortunes, the U.S. Department of Defense may be willing to consider smartphones other than BlackBerries if they can meet the government's tough security rules.
More details of the iPhone 5 CPU emerged this week, confirming Apple's claimed performance gains. But more importantly, they are the first indications of the impact of Apple's custom chip design, rather than relying on standardized cores licensed from ARM.
Most of the new phones support 4G/LTE cellular connectivity, providing a much bigger, always available, wireless data pipe at least for those subscribers who want it.
For Wi-Fi networks that are properly using 802.1X authentication, and that have transport layer security properly implemented, the impact of this exploit is essentially zero, experts say.
Articles by John CoxNext Page