News:
@RonaldSchlager ranked #23 in Onalytica´s List "Unified Communications": Top 100 Influencers and Brands
WLAN – What Infrastructure Is Required?
WLAN

WLANs (Wireless Local Area Networks) use radio transmission techniques. This makes them more flexible than their wired equivalents. You will learn in this article how the technology evolved in the past and will develop in the future. Important necessary components and services are described.

WLAN – What is it?

Wireless Local Area Network (WLAN) is a radio transmission technology mainly for mobile in-house communication.

Historical Development

The predecessor of today’s wired Ethernet network was a radio transmission technique that used universities to exchange…

Read More

DECT – Is there still a Future?
DECT

 

DECT or “Digital Enhanced Cordless Telecommunications” is a technology for cordless telephones with different functions, which was previously only designed for voice communication. Will it be superseded by Voice over IP?

(more…)

Read More

Internet of Things (IoT) – Training Topics

My first part about networking skills for the Internet of Things covered different fields of required knowledge („skills gap“). This part lists specific seminar topics to be covered in seminars on networks for the Internet of Things (IoT).

(more…)

Read More

Internet of Things (IoT) – Required Networking Skills

Networks for the Internet of Things (IoT) demand various knowledge. Based on their fields of application (and, as a consequence, different requirements) very different networks are in use. The  (future) task of an employee, his or her practical experience and previous knowledge call for very different networking skills.

(more…)

Read More

Whose Job is Mobile Security?

This article discusses the responsibility for mobile security from an independent view.

Mobile users like you and me

We are responsible for our privately owned mobile devices. For corporate owned devices we still have some responsibility. We handle the device, use apps and corporate data at different locations. As a first step we have to take care of physical and logical security.

If your IT department offers some security guidelines read them carefully. Be aware of legal consequences for users ignoring their…

Read More