Wireless developer Alexei Polyakov explains how compression applications can increase capabilities and cut costs by reducing the amount of data sent over wireless networks. This technology is already used widely in Japan, and Polyakov predicts it will be big elsewhere as 3G takes off.
These days you cannot talk about computers and networks without thinking of Linux and wireless networking. In this article, Sreekrishnan Venkateswaran explains wireless networking with WLAN, Bluetooth, GPRS, GSM, and IrDA from a Linux perspective. He uses various wireless devices and the corresponding kernel layers and user space tools to demonstrate how they work with Linux.
Learn about a new application development paradigm that takes advantage of the Open Service Gateway initiative (OSGi) service platform to achieve globalization features in wireless applications. You'll take a look at the approach from an architecture perspective, with a focus on how to manage language packs required by wireless applications in an on-demand environment and exemplify it with an implementation on the IBM Service Management Framework.
Installing Linux™ on your iPAQ can be a great way to breathe new life into aging hardware or make an existing tool even better, particularly if you are a fan of Linux on the desktop. You can leverage your existing knowledge and enjoy the benefits of familiar (pun intended) free and open source software on the move. In this article, learn how to turbocharge your HP-Compaq iPAQ PDA with Linux.
Mobile game developer Tom Park believes that scripting for wireless devices is important for proficiency sake. And with the need to scale mobile applications across so many different platforms, proficiency is everything. Read Park's thoughts on scripting, as well as his ideas on wireless application development's future.
Cyber guerillas are the newest breed of hackers. They love to hunt and sniff the air for signals emitted from the wireless handheld devices that you use to connect primarily with the WLAN. They then exploit the vulnerable network to launch an attack. In this article, Judith talks about who the cyber guerillas are and where you will most likely meet them. Additionally, she'll cover the various wireless security issues and describe how they use the tools of the trade to intercept, intrude upon, and attack the unprotected wireless traffic. Finally, a brief discussion about the VPN support, followed by a list of the shortcomings of mobile devices -- with suggested solutions to overcome them, of course.
The wireless development landscape differs from the wired world in a number of ways. For one thing, the dominance of handheld device manufacturers and proprietary OS makers has meant that open source projects for wireless connectivity have been slow to take off. But now this sector is showing some signs of life. In this article, Anne Zieger explains both the delays and the brightening future.
This article, the first in a two-part report, reviews common issues of wireless security, and shows how to use open source software to suss out wireless networks, get information about them, and start recognizing common security problems.
Mobile games have gained a lot of popularity among both consumers and developers in the past year. This article focuses on the key issues that face mobile game developers today, including the relationship with wireless operators and strategies for porting games to target multiple devices.
When the ability to write and modify your own management software is the main objective, a custom-built wireless access point is the way to go. Take a look at what's involved in building a wireless bridge using Linux, including software and hardware considerations.