SlideShare une entreprise Scribd logo
1  sur  15
Andrew Olsen


   Wireless Information Management:
              By Ron Elliot
               A Review :


University of Maryland University College
2


                                              Abstract

         Wireless technology is taking the world by storm. Everyone from businesses, families, and

governments are using wireless technology and it is only going to continue to expand. There are

many wireless systems available, but the most innovative are those that include Blackberry and

Bluetooth technology. As wireless technologies expand, there have been many device and

network trends, such as multi-function devices being developed, growing number of java-equipped

mobile devices, and integrating wireless with Internet. Third-generation (3G), WiFi, and Bluetooth

are the future of wireless networks. With the growth of wireless systems, there are a growing

number of challenges that have to be faced, like security and multiple wireless standards and the

affect it has on corporate information. It is imperative that businesses have a strategy to deal with

wireless information and it is information managers that must be prepared for any unforeseen

inefficiency arising from the use of wireless technologies with respect to data storage, information

retrieval, and content reliability.

                                            Introduction

         Wireless technology is taking the world by storm. Businesses, families, and governments

all around the world are embracing the wireless concept and it is going to continue to increase by

dramatic numbers. Wireless technologies are becoming the central means of business and are

increasing the quality and timeliness of information available. Many companies are now using

wireless-enabled pocket PCs, palm devices and a variety of other handheld computing products

that can run multiple applications. Wireless devices allow workers to stay productive and available

even while mired in meetings and away from their office desktops because they will have access to

corporate data, e-mail, IM, and the Internet (Ellison, 2003). It is these inherent advantages that

that make wireless systems the future of communications.
3


        As wireless technology expands, wireless management tools are becoming an absolute

necessity. Wireless devices have matured from being fringe devices to those that require

management to integrate with the rest of the business (NOVELL: 2001). However, businesses are

just beginning to confront wireless management issues (Hamblen, 2001) and understand its

importance. Wireless network-management tools let companies monitor traffic levels, ensure

security, assist capacity planning, and provide an overall picture of network health. It also presents

savings opportunities in both costs and resources. Wireless management is going to continue to

be a big issue in the near future and this article discusses the important issues that surround

wireless information management.

                          Wireless Information Management: Summary

        This article delves into growing use of wireless systems in the business community and the

difficulties that have evolved from trying to manage the information from these various wireless

devices. It first examines the various wireless systems that are currently available. There are

those lacking, as yet, wireless telecommunications facilities, such as personal digital assistants

(PDAs) and pocket PCs. Then there are those with user-controlled connection to a wireless

facility, such as mobile phones, text-based phones and Internet phones. Finally, there are those

wireless devices that are always connected, such as pagers, e-mail devices and Bluetooth devices.

        From there it examines current wireless networking device trends, such as 3G, WiFi, and

Bluetooth and explains how wireless technology impacts information management today and in the

future. There are also a variety of challenges that have an immediate impact on managing

information. Some of the issues wireless information managers face is ensuring that information

from remote devices is transferred to corporate memory, maintaining the integrity of the original

record, and most importantly, protecting the information in a handheld device from unauthorized

use.
4


        Wireless management issues are just now being confronted and will continue to be an

issue in the near future. This article stresses the importance of wireless information management

and how it will allow businesses to understand and prepare for further changes and challenges in

wireless technology.

                                        Wireless Systems

        Communication is key in any business setting and having a quality wireless system(s)

allows employees to work and more importantly communicate while they are out of the office.

There are various wireless systems currently available such as personal digital assistants (PDAs),

pocket PCs, mobile (cell, text-based, Internet) phones, pagers, and Blackberry and Bluetooth

devices. Choosing what wireless system is best all depends on your business needs.

        Of the various wireless systems, it is Blackberry and Bluetooth devices that are the most

innovative. Blackberry is a handheld device made by RIM (Research In Motion) and is marketed

primarily for its wireless e-mail handling capability (Yager, 2003). It also provides expanded Web

and wireless phone service (Strupp, 2003). Blackberry is also a PDA, which can include software

for maintaining an integral address book and personal calendar, while also being configured as a

pager. It is also licensing its technology to a number of wireless companies in order to expand

their market penetration.

        Bluetooth is a short-range wireless specification that allows for radio connections between

devices within a short distance of each other. This allows users of cell phones, pagers, and PDAs

to be able to buy a three-in-one phone that can double as a portable phone at home or in the office

and have all mobile and fixed computer devices be totally coordinated (Cummings, 2003).

Bluetooth can transfer appointments, contacts, images, audio clips, and Java programs between

wireless and fixed devices (Yager, 2003).
5


        Bluetooth and Blackberry devices make it possible for one device to have multiple

functions and eliminate the need for a variety of wireless devices. Everyone will be wireless at

some point in time, but the speed at which they achieve that will also depend on their business.

However, it is these devices that are taking wireless systems into the future and will become the

standard.

                                         Wireless Trends

        As wireless becomes part of everyday life, there are numerous developments that will

continue to expand wireless device and network reach. Wireless users can send photos, audio,

video, and text data to virtually any other kind of device. There has been a rise of combination

devices that perform PDA and cell phone functions. In addition, there is continuous development

of multi-function wireless devices that include telephone service, e-mail, Web browsing, gaming

and instant messaging, which integrates wireless with the Internet (Marshall. 2003). Java-enabled

mobile units have also continued to rise rapidly and Nokia believes that they will have sold 100

million Java-enabled cell phones in roughly three years (Perez, 2001). More specifically, there are

companies that are working to enable cell phone users to access PC desktops and run Windows

applications from a connected PDA and send email, and access and manage Outlook calendar

and contact data from a mobile phone (DEMOmobile…, 2003), just to name a few.

        With wireless devices comes the need for wireless networks. Currently, there are three

major networks: third-generation (3G), WiFi, and Bluetooth. 3G networks are targeted towards

cell-phone users and are suppose to be able to carry voice calls in higher volumes, but have yet to

meet any of their expectations. This was due to unrealistic projections by operators, complexities

in network infrastructure, handset interoperability, and stringent regulatory conditions (3G…, 2003).

In addition, it is still being determined whether or not implementing 3G networks are economical
6


because of the cost associated with it. However, it is believed that by next year 3G will peak,

mainly due to an expected thirst for voice capacity (3G…, 2003).

         WiFi capabilities are now standard in most computers (WiFi…, 2003) and are expected to

grow. This is partially attributed to the fact that its first product certifications under the new WiFi

Protected Access (WPA) specification were announced this year (Lawson, 2003). WiFi is also

growing because it can provide the high bandwidth and low costs per megabyte needed for PC

applications (Keene, 2003). This has lead WiFi to be included with many new notebook and PDA

purchases during 2003 and should reached 80% of all commercial notebooks by 2005 (Keene,

2003).

         Bluetooth has been promoted as the technology that would banish all cables, but it has

been slowed since the arrival of 802.11 technologies (Wireless ways…, 2003). Unlike 802.11,

Bluetooth moves data short distances enabling devices such as printers, notebooks, and headsets

to talk to one another (Bluetooth, 2003). It has found a niche with PDAs, but Bluetooth technology

is expanding to include printers, notebooks, and cameras. There is also an adapter, which

attaches to a USB port, that can allow non-Bluetooth PCs and notebooks to integrate with other

Bluetooth devices (Brown, 2003). Bluetooth has grown so much that shipments of the short-range

wireless technology exceeded 1 million units per week worldwide during the third quarter (Meyer,

2003) and it is believed that by 2007 more than 433 million Bluetooth devices will ship worldwide,

with an estimated market penetration of 74% (Logitech…, 2003).

                                          Wireless Challenges

         With wireless systems becoming the standard, along with the various wireless

developments, there are numerous challenges that face wireless users. The most contentious

issue has been information security and will be a major issue for the foreseeable future

(Anonymous, 2003).
7


        Security concerns are a major obstacle to wireless technology, but is at the center of every

wireless initiative. Wireless data transmissions are not yet secure because data is broadcast by

radio waves and can be inadvertently transmitted to other devices. Security, network, and radio

frequency management tools are still in their infancy (Cox, 2003). The range of potential wireless

security breaches increases as wireless hot spots proliferate in public places and wireless

company networks expand (Hatlestad, 2003). In addition, wireless devices can be easily

misplaced or stolen, exposing private information to anyone who finds it. More disturbing is that

70% of companies do not even have a policy that tells employees what to do if their wireless

device was lost or stolen (Cohn, 2002). The fact is that most wireless access points are difficult to

manage and secure, so there are often breaches in the armor when it comes to securing a network

(Ohlhorst, 2003). Securing wireless networks are becoming more difficult with no easy solution.

        Another difficult challenge facing wireless systems is the fact that there is no “universal

wireless standard.” What works with one system many not necessarily work with another. There is

a lack of compatibility amongst wireless systems due to competing wireless application protocol

(WAP) standards (Wireless…, 2002). Certain standards, such as WiFi and Bluetooth are globally

compatible. They have altered the industry landscape, which has accelerated the demand for

wireless monitoring and control applications worldwide (Karayannis, 2003). However, WiFi and

Bluetooth have lacked sufficient industry support or imposing requirements that are too costly to

satisfy emerging demand for wireless communication (Singer, 2002). Along with evolving

standards and the introduction of new standards, businesses are forced to frequently perform

upgrades to the wireless-infrastructure (Galicki, 2003), which can also be very costly. This also

has a great affect on managing corporate information. The challenge for businesses is determining

how to integrate all of their wireless systems and guarantee that their information will transfer from

wireless to fixed devices.
8


                                   Managing Wireless Information

        Information is what makes a business, but securing that information and making sure that

it is transferred undamaged from wireless to fixed systems is what can keep you in business. As

has been mentioned, the wireless systems are continuing to grow and develop. For that reason it

is imperative that businesses have a strategy to deal with wireless information, especially when

more and more consequential information is being stored on wireless devices while employees are

out of the office. This task is not as difficult for small businesses as it is for medium to large

businesses because of the amount of employees using wireless devices.

        The most important aspect of managing wireless information is protecting it. Only full,

incremental and differential backup scheduling can protect vital corporate information (Tanner,

2003). However, most wireless devices do not have disk drives and store downloaded information

and computer programs in local memory chips (Phillips, 2002). In addition, there are few wireless

devices that can have their data easily backed up to traditional storage devices (Phillips, 2002).

This task becomes even more difficult when employees also forget to protect and transfer

important information from their wireless device. That is why it is imperative to have authentication,

encryption mechanism, coupled with data integrity (Lawson, 2003)

        Information managers must be prepared for any unforeseen inefficiencies or dependencies

arising from the use of wireless technologies with respect to data storage, information retrieval,

protecting records, privacy, and content reliability (Phillips, 2002). Without this preparation wireless

devices will be a liability to business and lead to ineffective information management.

                                              Conclusion

        From simple pagers to high-tech multi-function PDAs or cell phones, wireless technology is

here to stay. Everyone from the teenager at the mall to the CEO of a major corporation is using

wireless devices. The use of wireless devices is becoming the norm and it will only continue to
9


expand, especially in the business world. Wireless technology has had a dramatic impact on the

way businesses operate. Now employees can be in constant contact with office and can

upload/download any important information in a few seconds.

        With the development of wireless devices there are numerous challenges that businesses

must face. No longer is important information safely stored in the corporate memory where it is

easier to secure and manage. Employees have information on PDAs, hand-held PCs, and laptops,

just to name a few and that information is at a constant risk. The integrity and security of that

information is what needs to be protected.

        The role of the information manager is more important now than it has ever been. They

are the ones who are responsible for the security and integrity of the information. Businesses must

understand the importance of information managers and a sound information management

strategy. Without a sound strategy the information that is so vital to businesses can become a

liability and affect their overall competitiveness.

        The future of wireless technology is endless and so are the challenges. Businesses are

only now beginning to understand the importance of managing their wireless devices and

information. It is imperative that they take control of the challenges now before it affects them in

the future. Preparing for the future begins with understanding current wireless developments and

challenges and information managers are key to that preparation. A perspicacious information

manager will see the problem before it occurs and use their wireless systems effectively in order to

ensure the security and integrity of the business’s information, especially when everything is

wireless and always connected.
10


                                           References:

“3G Launches to Peak in 2004, Study Says.” (2003, May 12). Electronic News (North America),

        Volume 49, Issue 19. Retrieved November 3, 2003 from MdUSA database Business

        Source Premier on the World Wide Web: http://www.umuc.edu/library/.


Anonymous. (2003, March). “Information security heads top 10.” The Practical Accountant,

        Boston: Volume 36, Issue 3, pg. 18. Retrieved November 2, 2003 from MdUSA database

        ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


“Bluetooth.” (2003, Fall). PC Magazine, Volume 22, Issue 18. Retrieved November 8, 2003 from

        MdUSA database Business Source Premier on the World Wide Web:

        http://www.umuc.edu/library/.


Brooks, Jason. (2003, August 11). “BlackBerry colors messages.” eWeek, Volume 20, Issue 32.

        Retrieved November 5, 2003 from MdUSA database Business Source Premier on the

        World Wide Web: http://www.umuc.edu/library/.


Brown, Bruce. (2003, November 11). “Add Bluetooth to Almost Anything.” PC Magazine, Volume

        22, Issue 20. Retrieved November 18, 2003 from MdUSA database Business Source

        Premier on the World Wide Web: http://www.umuc.edu/library/.


Cox, John. (2003, October 6). “Wireless grows, but security still a concern.” Network World

        Fusion, Wireless Notes. Retrieved November 1, 2003 from Network World Fusion on the

        World Wide Web: http://www.nwfusion.com/weblogs/wireless/003563.html.
11


Cummings, Betsy. (2003, October). “TOOLS OF THE TRADE.” Sales & Marketing Management,

        Volume 155, Issue 10. Retrieved November 8, 2003 from MdUSA database Business

        Source Premier on the World Wide Web: http://www.umuc.edu/library/.


“DEMOmobile 2003 Wraps with Compelling Presentations of Wireless Trends; Elite Executive

        Conference Focuses on Wireless Networks and Methods For Delivering and Accessing

        Mobile Content.” (2003, September 19). PR Newswire, Section; Financial News. Retrieved

        October 29, 2003 from MdUSA database LexisNexis on the World Wide Web:

        http://www.umuc.edu/library/.


Ellison, Craig. (2003, Fall). “Unwire Your Office.” PC Magazine, Volume 22, Issue 18. Retrieved

        November 1, 2003 from MdUSA database Business Source Premier on the World Wide

        Web: http://www.umuc.edu/library/.


Galicki, Peter. (2003, July 24). “Multiprocessing I/O enables efficient 3G base-station designs.”

        EDN, Volume 48, Issue 16, pg. 71. Retrieved November 12, 2003 from MdUSA database

        ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


Hamblen, Matt. (2001, December 10). “Wireless: Seeking new management.” Computerworld,

        Volume 35, Issue 50, pg. 32. Retrieved November 21, 2003 from MdUSA database

        ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


Hatlestad, Luc. (2003, November 10). “Emerging Technology -- Wireless Security Seeks Sweet

        Spot.” VARbusiness, pg. 20. Retrieved November 15, 2003 from MdUSA database

        ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.
12


Karayannis, George. (2003, July). “Emerging wireless standards.” Appliance Manufacturer, Volume

        51, Issue 7, pg. 27. Retrieved November 11, 2003 from MdUSA database ABI/Inform on

        the World Wide Web: http://www.umuc.edu/library/.


Keene, Ian. (2003, February 21). “Will Wi-Fi eclipse the promise of 3G?” Computer Weekly.

        Retrieved November 7, 2003 from MdUSA database Business Source Premier on the

        World Wide Web: http://www.umuc.edu/library/.


Lawson, Stephen. (2003, October 6). “WLAN security spec probably due next year.” IDG News

        Service. Retrieved November 3, 2003 from Network World Fusion on the World Wide Web:

        http://www.nwfusion.com/news/2003/0221wlansecur.html.


Lawson, Stephen. (2003, May 3). “WLAN vendors embrace security spec.” IDG News Service.

        Retrieved November 3, 2003 from Network World Fusion on the World Wide Web:

        http://www.nwfusion.com/news/2003/0503wlanvendo.html.


“Logitech Rolls Out Two Bluetooth Solutions for PCs.” (2003, September 21). Wireless News, pg.

        1. Retrieved October 30, 2003 from MdUSA database ABI/Inform on the World Wide Web:

        http://www.umuc.edu/library/.


Manes, Stephen. (2003, March 1). “Pocketful of Dreams.” Forbes, Volume 172, Issue 4. Retrieved

        October 28, 2003 from MdUSA database Business Source Premier on the World Wide

        Web: http://www.umuc.edu/library/.


Marshall, Matt. (2003, November 10). “Venture Capitalists Play It Cautiously with Wireless

        Investments.” San Jose Mercury News. Retrieved November 20, 2003 from MdUSA

        database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
13


McEvoy, Aoife M. and McDonald, Anne B. (2003, November). “Color Blackberry Wins With

        Wireless.” PC World, Volume 21, Issue 11. Retrieved November 18, 2003 from MdUSA

        database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/.


Messmer, Ellen and Cox, John. (2002, December 2). “Making wireless LAN security air tight; All-

        in-one security gateways are helping to boost confidence in wireless networks.” Network

        World. Retrieved October 30, 2003 from Network World Fusion on the World Wide Web:

        http://www.nwfusion.com/news/2002/1202earlywlan.html.


Meyer, Dan. (2003, October 28). “Bluetooth shipments hit milestone.” RCR Wireless News.

        Retrieved October 31, 2003 from RCR News on the World Wide Web:

        http://rcrnews.com/cgi-bin/news.pl?newsId=15690.


“NOVELL: Novell adds mobile and wireless device management to ZENworks portfolio through

        acquisition of Callisto Software; Novell's industry- leading desktop management expertise

        and Callisto's proficiency in mobile and wireless device management promise customers

        the best integrated solution for desktop, laptop and handheld management.” (2001,

        November 30). M2 Presswire. Retrieved November 20, 2003 from MdUSA database

        ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


Ohlhorst, Frank J. (2003, September 29). “Wavelink tackles multivendor WLANs.” CRN, Issue

        1064, pg. 26. Retrieved November 6, 2003 from MdUSA database ABI/Inform on the

        World Wide Web: http://www.umuc.edu/library/.


Perez, Bien. (2001, December 27). ”Wireless trend prompts safeguard expansion.” South China

        Morning Post (Hong Kong), Pg. 6. Retrieved October 31, 2003 from MdUSA database

        LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
14


Phillips, John T. (2002, January/February). “Welcome to the new wireless culture.” Information

        Management Journal, Volume 36, Issue 1, pg. 64. Retrieved October 27, 2003 from

        MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


Singer, Ari. (2002, March 11). “802.15 aims to secure wireless PANs.” Network World. Retrieved

        October 30, 2003 from Network World Fusion on the World Wide Web:

        http://www.nwfusion.com/tech/2002/0311tech.html.


Skaer, Mark. (2003, July 14). “More wireless applications on the way.” Air Conditioning, Heating &

        Refrigeration News, Volume 219, Issue 11, pg. 12. Retrieved October 29, 2003 from

        MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


Stroh, Steve. (2001, February). “WIRELESS CHOICES FOR EVOLVING ISP ECOSYSTEMS.”

        Boardwatch Magazine, Volume 15, Issue 2. Retrieved October 28, 2003 from MdUSA

        database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/.


Strupp, Joe. (2003, September 22). “HERE WE GO AGAIN.” Publisher & Editor, Volume 136,

        Issue 33. Retrieved October 31, 2003 from MdUSA database Business Source Premier on

        the World Wide Web: http://www.umuc.edu/library/.


Tanner, Bill. (2003, March). “Anywhere computing opens endless possibilities...of data loss.”

        Unisys World, Volume 24, Issue 3, pg. 12. Retrieved November 1, 2003 from MdUSA

        database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.


“WIFI WATCHDOG 2.O WORKS WITH ANY WIRELESS LAN.” (2003, August). LAN Product

        News. Retrieved November 3, 2003 from MdUSA database Business Source Premier on

        the World Wide Web: http://www.umuc.edu/library/.
15


“Wireless Does Have Real ROI.” (2002, May 15). CIO Magazine. Retrieved October 29, 2003 from

        MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.


“WIRELESS WAYS FOR YOUR PDA.” (2003, Fall). PC Magazine, Volume 22, Issue 18. Retrieved

        November 13, 2003 from MdUSA database Business Source Premier on the World Wide

        Web: http://www.umuc.edu/library/.


Yager, Tom. (2003, March 24). “Can't live without it.” InfoWorld, Volume 25, Issue 12. Retrieved

        November 11, 2003 from MdUSA database Business Source Premier on the World Wide

        Web: http://www.umuc.edu/library/.

Contenu connexe

Tendances

Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
Latest trends in wireless technology
Latest trends in wireless technology Latest trends in wireless technology
Latest trends in wireless technology Dr. Mazlan Abbas
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)Malik Afzaal
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarTapesh Chalisgaonkar
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloudijtsrd
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Societykerjait
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET Journal
 
MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1Prof. Bholanath Dutta
 
e-Home Assistant
e-Home Assistante-Home Assistant
e-Home Assistantijtsrd
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation SystemIRJET Journal
 

Tendances (18)

Wp 3g
Wp 3gWp 3g
Wp 3g
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Latest trends in wireless technology
Latest trends in wireless technology Latest trends in wireless technology
Latest trends in wireless technology
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Mobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh ChalisgaonkarMobile Computing by Tapesh Chalisgaonkar
Mobile Computing by Tapesh Chalisgaonkar
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Smart Computing Mobile Cloud
Smart Computing Mobile CloudSmart Computing Mobile Cloud
Smart Computing Mobile Cloud
 
Impact Of Ict In Society
Impact Of Ict In SocietyImpact Of Ict In Society
Impact Of Ict In Society
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 
MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1MTC FDP @ Bangalore on 02.02.2014 PPT-1
MTC FDP @ Bangalore on 02.02.2014 PPT-1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
e-Home Assistant
e-Home Assistante-Home Assistant
e-Home Assistant
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 

Similaire à Wireless information management, a review

11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docxhyacinthshackley2629
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networkingMilan Padariya
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
Mobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on InvestmentMobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on InvestmentKartik Mehta
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 

Similaire à Wireless information management, a review (20)

11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx11Wireless SecurityHere is a sample research paper that I .docx
11Wireless SecurityHere is a sample research paper that I .docx
 
Wireless Communication Has Changed Our World
Wireless Communication Has Changed Our WorldWireless Communication Has Changed Our World
Wireless Communication Has Changed Our World
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Essay On Wireless Technology
Essay On Wireless TechnologyEssay On Wireless Technology
Essay On Wireless Technology
 
The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
3 g vs wifi
3 g vs wifi3 g vs wifi
3 g vs wifi
 
Mobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on InvestmentMobile services and its impact on GPDs and Return on Investment
Mobile services and its impact on GPDs and Return on Investment
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 

Plus de Andrew Olsen

Asia renal care taiwan business plan
Asia renal care taiwan business planAsia renal care taiwan business plan
Asia renal care taiwan business planAndrew Olsen
 
Zipcar case analysis
Zipcar case analysisZipcar case analysis
Zipcar case analysisAndrew Olsen
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewAndrew Olsen
 
Balanced Score Card Congressional District Office
Balanced Score Card Congressional District OfficeBalanced Score Card Congressional District Office
Balanced Score Card Congressional District OfficeAndrew Olsen
 
Internet marketing startegy for Nike
Internet marketing startegy for NikeInternet marketing startegy for Nike
Internet marketing startegy for NikeAndrew Olsen
 
Friedman vs Carroll Corporate Social Responsibility & Outsourcing
Friedman vs Carroll Corporate Social Responsibility & OutsourcingFriedman vs Carroll Corporate Social Responsibility & Outsourcing
Friedman vs Carroll Corporate Social Responsibility & OutsourcingAndrew Olsen
 
Fast food vs family restaurant
Fast food vs family restaurantFast food vs family restaurant
Fast food vs family restaurantAndrew Olsen
 

Plus de Andrew Olsen (7)

Asia renal care taiwan business plan
Asia renal care taiwan business planAsia renal care taiwan business plan
Asia renal care taiwan business plan
 
Zipcar case analysis
Zipcar case analysisZipcar case analysis
Zipcar case analysis
 
Wireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a reviewWireless advertising messaging legal analysis & public policy issues, a review
Wireless advertising messaging legal analysis & public policy issues, a review
 
Balanced Score Card Congressional District Office
Balanced Score Card Congressional District OfficeBalanced Score Card Congressional District Office
Balanced Score Card Congressional District Office
 
Internet marketing startegy for Nike
Internet marketing startegy for NikeInternet marketing startegy for Nike
Internet marketing startegy for Nike
 
Friedman vs Carroll Corporate Social Responsibility & Outsourcing
Friedman vs Carroll Corporate Social Responsibility & OutsourcingFriedman vs Carroll Corporate Social Responsibility & Outsourcing
Friedman vs Carroll Corporate Social Responsibility & Outsourcing
 
Fast food vs family restaurant
Fast food vs family restaurantFast food vs family restaurant
Fast food vs family restaurant
 

Wireless information management, a review

  • 1. Andrew Olsen Wireless Information Management: By Ron Elliot A Review : University of Maryland University College
  • 2. 2 Abstract Wireless technology is taking the world by storm. Everyone from businesses, families, and governments are using wireless technology and it is only going to continue to expand. There are many wireless systems available, but the most innovative are those that include Blackberry and Bluetooth technology. As wireless technologies expand, there have been many device and network trends, such as multi-function devices being developed, growing number of java-equipped mobile devices, and integrating wireless with Internet. Third-generation (3G), WiFi, and Bluetooth are the future of wireless networks. With the growth of wireless systems, there are a growing number of challenges that have to be faced, like security and multiple wireless standards and the affect it has on corporate information. It is imperative that businesses have a strategy to deal with wireless information and it is information managers that must be prepared for any unforeseen inefficiency arising from the use of wireless technologies with respect to data storage, information retrieval, and content reliability. Introduction Wireless technology is taking the world by storm. Businesses, families, and governments all around the world are embracing the wireless concept and it is going to continue to increase by dramatic numbers. Wireless technologies are becoming the central means of business and are increasing the quality and timeliness of information available. Many companies are now using wireless-enabled pocket PCs, palm devices and a variety of other handheld computing products that can run multiple applications. Wireless devices allow workers to stay productive and available even while mired in meetings and away from their office desktops because they will have access to corporate data, e-mail, IM, and the Internet (Ellison, 2003). It is these inherent advantages that that make wireless systems the future of communications.
  • 3. 3 As wireless technology expands, wireless management tools are becoming an absolute necessity. Wireless devices have matured from being fringe devices to those that require management to integrate with the rest of the business (NOVELL: 2001). However, businesses are just beginning to confront wireless management issues (Hamblen, 2001) and understand its importance. Wireless network-management tools let companies monitor traffic levels, ensure security, assist capacity planning, and provide an overall picture of network health. It also presents savings opportunities in both costs and resources. Wireless management is going to continue to be a big issue in the near future and this article discusses the important issues that surround wireless information management. Wireless Information Management: Summary This article delves into growing use of wireless systems in the business community and the difficulties that have evolved from trying to manage the information from these various wireless devices. It first examines the various wireless systems that are currently available. There are those lacking, as yet, wireless telecommunications facilities, such as personal digital assistants (PDAs) and pocket PCs. Then there are those with user-controlled connection to a wireless facility, such as mobile phones, text-based phones and Internet phones. Finally, there are those wireless devices that are always connected, such as pagers, e-mail devices and Bluetooth devices. From there it examines current wireless networking device trends, such as 3G, WiFi, and Bluetooth and explains how wireless technology impacts information management today and in the future. There are also a variety of challenges that have an immediate impact on managing information. Some of the issues wireless information managers face is ensuring that information from remote devices is transferred to corporate memory, maintaining the integrity of the original record, and most importantly, protecting the information in a handheld device from unauthorized use.
  • 4. 4 Wireless management issues are just now being confronted and will continue to be an issue in the near future. This article stresses the importance of wireless information management and how it will allow businesses to understand and prepare for further changes and challenges in wireless technology. Wireless Systems Communication is key in any business setting and having a quality wireless system(s) allows employees to work and more importantly communicate while they are out of the office. There are various wireless systems currently available such as personal digital assistants (PDAs), pocket PCs, mobile (cell, text-based, Internet) phones, pagers, and Blackberry and Bluetooth devices. Choosing what wireless system is best all depends on your business needs. Of the various wireless systems, it is Blackberry and Bluetooth devices that are the most innovative. Blackberry is a handheld device made by RIM (Research In Motion) and is marketed primarily for its wireless e-mail handling capability (Yager, 2003). It also provides expanded Web and wireless phone service (Strupp, 2003). Blackberry is also a PDA, which can include software for maintaining an integral address book and personal calendar, while also being configured as a pager. It is also licensing its technology to a number of wireless companies in order to expand their market penetration. Bluetooth is a short-range wireless specification that allows for radio connections between devices within a short distance of each other. This allows users of cell phones, pagers, and PDAs to be able to buy a three-in-one phone that can double as a portable phone at home or in the office and have all mobile and fixed computer devices be totally coordinated (Cummings, 2003). Bluetooth can transfer appointments, contacts, images, audio clips, and Java programs between wireless and fixed devices (Yager, 2003).
  • 5. 5 Bluetooth and Blackberry devices make it possible for one device to have multiple functions and eliminate the need for a variety of wireless devices. Everyone will be wireless at some point in time, but the speed at which they achieve that will also depend on their business. However, it is these devices that are taking wireless systems into the future and will become the standard. Wireless Trends As wireless becomes part of everyday life, there are numerous developments that will continue to expand wireless device and network reach. Wireless users can send photos, audio, video, and text data to virtually any other kind of device. There has been a rise of combination devices that perform PDA and cell phone functions. In addition, there is continuous development of multi-function wireless devices that include telephone service, e-mail, Web browsing, gaming and instant messaging, which integrates wireless with the Internet (Marshall. 2003). Java-enabled mobile units have also continued to rise rapidly and Nokia believes that they will have sold 100 million Java-enabled cell phones in roughly three years (Perez, 2001). More specifically, there are companies that are working to enable cell phone users to access PC desktops and run Windows applications from a connected PDA and send email, and access and manage Outlook calendar and contact data from a mobile phone (DEMOmobile…, 2003), just to name a few. With wireless devices comes the need for wireless networks. Currently, there are three major networks: third-generation (3G), WiFi, and Bluetooth. 3G networks are targeted towards cell-phone users and are suppose to be able to carry voice calls in higher volumes, but have yet to meet any of their expectations. This was due to unrealistic projections by operators, complexities in network infrastructure, handset interoperability, and stringent regulatory conditions (3G…, 2003). In addition, it is still being determined whether or not implementing 3G networks are economical
  • 6. 6 because of the cost associated with it. However, it is believed that by next year 3G will peak, mainly due to an expected thirst for voice capacity (3G…, 2003). WiFi capabilities are now standard in most computers (WiFi…, 2003) and are expected to grow. This is partially attributed to the fact that its first product certifications under the new WiFi Protected Access (WPA) specification were announced this year (Lawson, 2003). WiFi is also growing because it can provide the high bandwidth and low costs per megabyte needed for PC applications (Keene, 2003). This has lead WiFi to be included with many new notebook and PDA purchases during 2003 and should reached 80% of all commercial notebooks by 2005 (Keene, 2003). Bluetooth has been promoted as the technology that would banish all cables, but it has been slowed since the arrival of 802.11 technologies (Wireless ways…, 2003). Unlike 802.11, Bluetooth moves data short distances enabling devices such as printers, notebooks, and headsets to talk to one another (Bluetooth, 2003). It has found a niche with PDAs, but Bluetooth technology is expanding to include printers, notebooks, and cameras. There is also an adapter, which attaches to a USB port, that can allow non-Bluetooth PCs and notebooks to integrate with other Bluetooth devices (Brown, 2003). Bluetooth has grown so much that shipments of the short-range wireless technology exceeded 1 million units per week worldwide during the third quarter (Meyer, 2003) and it is believed that by 2007 more than 433 million Bluetooth devices will ship worldwide, with an estimated market penetration of 74% (Logitech…, 2003). Wireless Challenges With wireless systems becoming the standard, along with the various wireless developments, there are numerous challenges that face wireless users. The most contentious issue has been information security and will be a major issue for the foreseeable future (Anonymous, 2003).
  • 7. 7 Security concerns are a major obstacle to wireless technology, but is at the center of every wireless initiative. Wireless data transmissions are not yet secure because data is broadcast by radio waves and can be inadvertently transmitted to other devices. Security, network, and radio frequency management tools are still in their infancy (Cox, 2003). The range of potential wireless security breaches increases as wireless hot spots proliferate in public places and wireless company networks expand (Hatlestad, 2003). In addition, wireless devices can be easily misplaced or stolen, exposing private information to anyone who finds it. More disturbing is that 70% of companies do not even have a policy that tells employees what to do if their wireless device was lost or stolen (Cohn, 2002). The fact is that most wireless access points are difficult to manage and secure, so there are often breaches in the armor when it comes to securing a network (Ohlhorst, 2003). Securing wireless networks are becoming more difficult with no easy solution. Another difficult challenge facing wireless systems is the fact that there is no “universal wireless standard.” What works with one system many not necessarily work with another. There is a lack of compatibility amongst wireless systems due to competing wireless application protocol (WAP) standards (Wireless…, 2002). Certain standards, such as WiFi and Bluetooth are globally compatible. They have altered the industry landscape, which has accelerated the demand for wireless monitoring and control applications worldwide (Karayannis, 2003). However, WiFi and Bluetooth have lacked sufficient industry support or imposing requirements that are too costly to satisfy emerging demand for wireless communication (Singer, 2002). Along with evolving standards and the introduction of new standards, businesses are forced to frequently perform upgrades to the wireless-infrastructure (Galicki, 2003), which can also be very costly. This also has a great affect on managing corporate information. The challenge for businesses is determining how to integrate all of their wireless systems and guarantee that their information will transfer from wireless to fixed devices.
  • 8. 8 Managing Wireless Information Information is what makes a business, but securing that information and making sure that it is transferred undamaged from wireless to fixed systems is what can keep you in business. As has been mentioned, the wireless systems are continuing to grow and develop. For that reason it is imperative that businesses have a strategy to deal with wireless information, especially when more and more consequential information is being stored on wireless devices while employees are out of the office. This task is not as difficult for small businesses as it is for medium to large businesses because of the amount of employees using wireless devices. The most important aspect of managing wireless information is protecting it. Only full, incremental and differential backup scheduling can protect vital corporate information (Tanner, 2003). However, most wireless devices do not have disk drives and store downloaded information and computer programs in local memory chips (Phillips, 2002). In addition, there are few wireless devices that can have their data easily backed up to traditional storage devices (Phillips, 2002). This task becomes even more difficult when employees also forget to protect and transfer important information from their wireless device. That is why it is imperative to have authentication, encryption mechanism, coupled with data integrity (Lawson, 2003) Information managers must be prepared for any unforeseen inefficiencies or dependencies arising from the use of wireless technologies with respect to data storage, information retrieval, protecting records, privacy, and content reliability (Phillips, 2002). Without this preparation wireless devices will be a liability to business and lead to ineffective information management. Conclusion From simple pagers to high-tech multi-function PDAs or cell phones, wireless technology is here to stay. Everyone from the teenager at the mall to the CEO of a major corporation is using wireless devices. The use of wireless devices is becoming the norm and it will only continue to
  • 9. 9 expand, especially in the business world. Wireless technology has had a dramatic impact on the way businesses operate. Now employees can be in constant contact with office and can upload/download any important information in a few seconds. With the development of wireless devices there are numerous challenges that businesses must face. No longer is important information safely stored in the corporate memory where it is easier to secure and manage. Employees have information on PDAs, hand-held PCs, and laptops, just to name a few and that information is at a constant risk. The integrity and security of that information is what needs to be protected. The role of the information manager is more important now than it has ever been. They are the ones who are responsible for the security and integrity of the information. Businesses must understand the importance of information managers and a sound information management strategy. Without a sound strategy the information that is so vital to businesses can become a liability and affect their overall competitiveness. The future of wireless technology is endless and so are the challenges. Businesses are only now beginning to understand the importance of managing their wireless devices and information. It is imperative that they take control of the challenges now before it affects them in the future. Preparing for the future begins with understanding current wireless developments and challenges and information managers are key to that preparation. A perspicacious information manager will see the problem before it occurs and use their wireless systems effectively in order to ensure the security and integrity of the business’s information, especially when everything is wireless and always connected.
  • 10. 10 References: “3G Launches to Peak in 2004, Study Says.” (2003, May 12). Electronic News (North America), Volume 49, Issue 19. Retrieved November 3, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Anonymous. (2003, March). “Information security heads top 10.” The Practical Accountant, Boston: Volume 36, Issue 3, pg. 18. Retrieved November 2, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. “Bluetooth.” (2003, Fall). PC Magazine, Volume 22, Issue 18. Retrieved November 8, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Brooks, Jason. (2003, August 11). “BlackBerry colors messages.” eWeek, Volume 20, Issue 32. Retrieved November 5, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Brown, Bruce. (2003, November 11). “Add Bluetooth to Almost Anything.” PC Magazine, Volume 22, Issue 20. Retrieved November 18, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Cox, John. (2003, October 6). “Wireless grows, but security still a concern.” Network World Fusion, Wireless Notes. Retrieved November 1, 2003 from Network World Fusion on the World Wide Web: http://www.nwfusion.com/weblogs/wireless/003563.html.
  • 11. 11 Cummings, Betsy. (2003, October). “TOOLS OF THE TRADE.” Sales & Marketing Management, Volume 155, Issue 10. Retrieved November 8, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. “DEMOmobile 2003 Wraps with Compelling Presentations of Wireless Trends; Elite Executive Conference Focuses on Wireless Networks and Methods For Delivering and Accessing Mobile Content.” (2003, September 19). PR Newswire, Section; Financial News. Retrieved October 29, 2003 from MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/. Ellison, Craig. (2003, Fall). “Unwire Your Office.” PC Magazine, Volume 22, Issue 18. Retrieved November 1, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Galicki, Peter. (2003, July 24). “Multiprocessing I/O enables efficient 3G base-station designs.” EDN, Volume 48, Issue 16, pg. 71. Retrieved November 12, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Hamblen, Matt. (2001, December 10). “Wireless: Seeking new management.” Computerworld, Volume 35, Issue 50, pg. 32. Retrieved November 21, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Hatlestad, Luc. (2003, November 10). “Emerging Technology -- Wireless Security Seeks Sweet Spot.” VARbusiness, pg. 20. Retrieved November 15, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/.
  • 12. 12 Karayannis, George. (2003, July). “Emerging wireless standards.” Appliance Manufacturer, Volume 51, Issue 7, pg. 27. Retrieved November 11, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Keene, Ian. (2003, February 21). “Will Wi-Fi eclipse the promise of 3G?” Computer Weekly. Retrieved November 7, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Lawson, Stephen. (2003, October 6). “WLAN security spec probably due next year.” IDG News Service. Retrieved November 3, 2003 from Network World Fusion on the World Wide Web: http://www.nwfusion.com/news/2003/0221wlansecur.html. Lawson, Stephen. (2003, May 3). “WLAN vendors embrace security spec.” IDG News Service. Retrieved November 3, 2003 from Network World Fusion on the World Wide Web: http://www.nwfusion.com/news/2003/0503wlanvendo.html. “Logitech Rolls Out Two Bluetooth Solutions for PCs.” (2003, September 21). Wireless News, pg. 1. Retrieved October 30, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Manes, Stephen. (2003, March 1). “Pocketful of Dreams.” Forbes, Volume 172, Issue 4. Retrieved October 28, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Marshall, Matt. (2003, November 10). “Venture Capitalists Play It Cautiously with Wireless Investments.” San Jose Mercury News. Retrieved November 20, 2003 from MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
  • 13. 13 McEvoy, Aoife M. and McDonald, Anne B. (2003, November). “Color Blackberry Wins With Wireless.” PC World, Volume 21, Issue 11. Retrieved November 18, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Messmer, Ellen and Cox, John. (2002, December 2). “Making wireless LAN security air tight; All- in-one security gateways are helping to boost confidence in wireless networks.” Network World. Retrieved October 30, 2003 from Network World Fusion on the World Wide Web: http://www.nwfusion.com/news/2002/1202earlywlan.html. Meyer, Dan. (2003, October 28). “Bluetooth shipments hit milestone.” RCR Wireless News. Retrieved October 31, 2003 from RCR News on the World Wide Web: http://rcrnews.com/cgi-bin/news.pl?newsId=15690. “NOVELL: Novell adds mobile and wireless device management to ZENworks portfolio through acquisition of Callisto Software; Novell's industry- leading desktop management expertise and Callisto's proficiency in mobile and wireless device management promise customers the best integrated solution for desktop, laptop and handheld management.” (2001, November 30). M2 Presswire. Retrieved November 20, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Ohlhorst, Frank J. (2003, September 29). “Wavelink tackles multivendor WLANs.” CRN, Issue 1064, pg. 26. Retrieved November 6, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Perez, Bien. (2001, December 27). ”Wireless trend prompts safeguard expansion.” South China Morning Post (Hong Kong), Pg. 6. Retrieved October 31, 2003 from MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/.
  • 14. 14 Phillips, John T. (2002, January/February). “Welcome to the new wireless culture.” Information Management Journal, Volume 36, Issue 1, pg. 64. Retrieved October 27, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Singer, Ari. (2002, March 11). “802.15 aims to secure wireless PANs.” Network World. Retrieved October 30, 2003 from Network World Fusion on the World Wide Web: http://www.nwfusion.com/tech/2002/0311tech.html. Skaer, Mark. (2003, July 14). “More wireless applications on the way.” Air Conditioning, Heating & Refrigeration News, Volume 219, Issue 11, pg. 12. Retrieved October 29, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. Stroh, Steve. (2001, February). “WIRELESS CHOICES FOR EVOLVING ISP ECOSYSTEMS.” Boardwatch Magazine, Volume 15, Issue 2. Retrieved October 28, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Strupp, Joe. (2003, September 22). “HERE WE GO AGAIN.” Publisher & Editor, Volume 136, Issue 33. Retrieved October 31, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Tanner, Bill. (2003, March). “Anywhere computing opens endless possibilities...of data loss.” Unisys World, Volume 24, Issue 3, pg. 12. Retrieved November 1, 2003 from MdUSA database ABI/Inform on the World Wide Web: http://www.umuc.edu/library/. “WIFI WATCHDOG 2.O WORKS WITH ANY WIRELESS LAN.” (2003, August). LAN Product News. Retrieved November 3, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/.
  • 15. 15 “Wireless Does Have Real ROI.” (2002, May 15). CIO Magazine. Retrieved October 29, 2003 from MdUSA database LexisNexis on the World Wide Web: http://www.umuc.edu/library/. “WIRELESS WAYS FOR YOUR PDA.” (2003, Fall). PC Magazine, Volume 22, Issue 18. Retrieved November 13, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/. Yager, Tom. (2003, March 24). “Can't live without it.” InfoWorld, Volume 25, Issue 12. Retrieved November 11, 2003 from MdUSA database Business Source Premier on the World Wide Web: http://www.umuc.edu/library/.