NETWORK WORLD NEWSLETTER: JOANIE WEXLER ON WIRELESS IN THE
ENTERPRISE
10/03/05
Today's focus: CTIA show faces reality of mixed mobile nets
Dear networking.world@gmail.com,
In this issue:
* Managing heterogeneous mobile environments
* Links related to Wireless in the Enterprise
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by "Orative"
Reach Your Mobile Workforce
Orative develops mobile software that lets employees reach the
right resources, right now. Using innovative presence technology
running on mobile phones, Orative software gives employees the
ability to reach co-workers so that they can ask for help, make
decisions and move business forward. Orative transforms the
mobile phone into a true business phone. Find out more at
http://www.fattail.com/redir/redirect.asp?CID=116690
_______________________________________________________________
DOES WMM MAKE YOU GO HMMM?
Eager to spur interoperable QoS among different vendors'
wireless gear, the Wi-Fi Alliance developed the Wi-Fi Multimedia
(WMM) specification. WMM is designed to support consumer and
corporate applications and works with all three 802.11 wireless
physical layer standards. For more on how WMM handles the
prioritization of data packets, DCF, CM and more, click here:
http://www.fattail.com/redir/redirect.asp?CID=116117
_______________________________________________________________
Today's focus: CTIA show faces reality of mixed mobile nets
By Joanie Wexler
If last week's CTIA Wireless IT & Entertainment 2005 show in San
Francisco had a theme, I would say it was "heterogeneity."
There was a growing awareness that multiple mobile operating
systems, client devices and even carriers will be a fact of life
in the enterprise for the foreseeable future. The reason can be
chalked up to differences in enterprise user device preferences
and needs, as well as diversity in coverage requirements across
domestic and international geographies.
And enterprise IT departments need ways to provide access from
all these devices and locations to corporate resources. They
also need to centrally manage and secure smart devices that
contain sensitive information. These requirements are motivating
some vendor companies to act.
For example, the day before the CTIA exhibit floor opened, Palm
and Microsoft announced that Palm would be licensing Microsoft's
Mobile 5.0 mobile operating system to run on its Treo 600 and
650 smartphones. As a result, users of the devices will be able
to choose between the PalmOS and Windows Mobile 5.0 operating
systems. Mobile 5.0-enabled Treos, to be available for use on
the Verizon Wireless EV-DO (500K-700K bit/sec) network in early
2006, would allow Treo users to connect to their corporate
Exchange e-mail servers and deploy corporate applications
written for Windows.
The move exemplifies an acknowledgement that more handhelds need
to support access to back-end corporate resources. To date,
Treos have succeeded more as consumer-centric devices; the move
gives them more of an enterprise play. And, to date, Microsoft
operating system-enabled devices do a good job of allowing
access to Microsoft resources only. Beyond that, Research In
Motion's BlackBerry, with its Enterprise Server, has been the
only architecture allowing users of handhelds access to their
full suite of back-end apps.
For getting the enterprise IT control tentacles around disparate
devices, operating systems and networks, Good Technology
announced that it would support the combo Palm-Mobile 5.0
devices with its centralized management, application-update, and
security software. It also plans to support the Symbian OS
(Nokia devices) in 2006.
Meanwhile, start-up Orative Technology was on the show floor,
explaining that its presence management software is both device-
and carrier-agnostic. Orative's enterprise software enables
business users to screen voice calls based on caller identity,
subject matter, identity and the called user's availability.
President and CEO Paul Fulton explains that the software runs
SSL encryption and single sign-on authentication, and that
corporate IT has the ability to centrally deactivate lost phones
and erase sensitive information from remote devices.
The top 5: Today's most-read stories
1. How to solve Windows system crashes in minutes
<http://www.networkworld.com/nlwir7856>
2. Verizon CTO lays out next-gen network plans
<http://www.networkworld.com/nlwir8002>
3. McAfee, Omniquad top anti-spyware test
<http://www.networkworld.com/nlwir6911>
4. Digging out new rootkits
<http://www.networkworld.com/nlwir8003>
5. Skype: Hazardous to network health?
<http://www.networkworld.com/nlwir7855>
_______________________________________________________________
To contact: Joanie Wexler
Joanie Wexler is an independent networking technology
writer/editor in California's Silicon Valley who has spent most
of her career analyzing trends and news in the computer
networking industry. She welcomes your comments on the articles
published in this newsletter, as well as your ideas for future
article topics. Reach her at <mailto:joanie@jwexler.com>.
_______________________________________________________________
This newsletter is sponsored by "Orative"
Reach Your Mobile Workforce
Orative develops mobile software that lets employees reach the
right resources, right now. Using innovative presence technology
running on mobile phones, Orative software gives employees the
ability to reach co-workers so that they can ask for help, make
decisions and move business forward. Orative transforms the
mobile phone into a true business phone. Find out more at
http://www.fattail.com/redir/redirect.asp?CID=116689
_______________________________________________________________
ARCHIVE LINKS
Archive of the Wireless in the Enterprise newsletter:
http://www.networkworld.com/newsletters/wireless/index.html
Wireless research center
Latest wireless news, analysis and resource links
http://www.networkworld.com/topics/wireless.html
_______________________________________________________________
FEATURED READER RESOURCE
The Trend Micro Threat Map
The Trend Micro Threat Map dynamically displays real-time data
to show worldwide trends in virus and content security threats
as they happen. Collected from actual computer infections, the
Threat Map can be used to help determine appropriate security
policies, based on the prevalence of threats that can adversely
affect your business.
<http://www.networkworld.com/go/trendmicro/trend_frr>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment