Fixed/mobile convergence: Why it matters
Related Articles
- Cool Tools: Quick takes on high-tech toys. Shaw, Keith // Network World;12/4/2006, Vol. 23 Issue 47, p40
The article focuses on the development of Treo 680, a smart phone manufactured by Palm and operates on the Cingular Enhanced Data for Global Evolution (EDGE) wireless network. Its advantageous features are illustrated since it is aimed for consumers and business users who have feature-rich...
- Cool Tools. Shaw, Keith // Network World;4/16/2007, Vol. 24 Issue 15, p21
The article provides information about the new mobile phones of Verizon Wireless, loaded with V Cast Mobile TV service, as introduced during the CTIA Wireless 2007 show in Orlando, Florida. The new mobile phone, Samsung SCH-u620, has included features, such as a 1.3-megapixel digital camera and...
- Bluetooth roadmap could enhance cellular revenue. Poe, Robert // America's Network;12/1/2004, Vol. 108 Issue 18, p8
Examines the potential of Bluetooth technology as a revenue enhancer and source for mobile phone industry in the U.S. Growth of Bluetooth sales used in mobile phones and other high technology devices; Significant advances and features in Bluetooth technology; Advantages and disadvantages of the...
- Powering the 4G handset RF front end. Hildersley, Julian // Electronics Weekly;12/3/2008, Issue 2263, p22
The article reports on the claim of ABI Research Inc. that the battery life for Wimax and other 4G handsets could end up being a third of that of 3G. It mentions that the creation of a broadband cellular network air interface for 3G's long term evolution is not easy, particularly if the air...
- And Now -- Moblogging. Mullen, Georgia // Telecommunications - Americas Edition;Aug2006, Vol. 40 Issue 8, p6
The article discusses the significance of mobile phones in the existence of mankind. Mobile phones are evaluated as the most important piece of technology compared to computers, television or lap top. This is because mobile phone enables to bring connection at any place the person is at a given...
- Punishing Malicious Hosts with the Cryptographic Traces Approach. Esparza, Oscar; Muñoz, Jose L.; Soriano, Miguel; Forné, Jordi // New Generation Computing;2006, Vol. 24 Issue 4, p351
The use of mobile agents seems the natural way to improve the network conditions to provide an easy access to future services. Unfortunately, there are some security constraints that avoid a massive use of mobile agents systems. The protection of mobile agents against the attacks of malicious...
- out now. // Wireless Asia;Sep2004, Vol. 7 Issue 7, p40
Focuses on the mobile phone services and solutions offered by various mobile phone services companies in the U.S. Announcement of the deployment of the Smartner Daily Always-on Mail Solution; Launching of the third generation mobile phone channel in Hong Kong; Introduction of the new strategy...
- THE PERFECT MOBILE. Yiacoumi, Roulla // Australian PC User;Feb2007, Vol. 19 Issue 2, p64
The article offers tips in choosing and buying a mobile phone. Make sure to do research before walking into a store to buy a phone. Start by checking the manufacturer's Web site. Motorola was the first manufacturer to recognize the importance of style with the much-copied V3 handset. Check the...
- WHY YOU WILL COME TO LOVE DEAD ZONES. Steinert-Threlkeld, Tom // Baseline;Jun2004, Issue 31, p10
The article comments on cellular telephone dead zones. For the first 20 years of cellular communications, mobile handset users have complained about dead zones, and keep switching services to get reliable connections. In the next 20 years, organizations of all types will be seeking out dead...