By the Numbers

January 2004
Wireless Week;1/1/2004, Vol. 10 Issue 1, p24
Trade Publication
Presents surveys of the telecommunication industry as of January 1, 2004. Emergence of cellular telephones with hard disk drives, according to American Technology Research; Reasons of teenagers for wanting a wireless phone, according to International Communications Research; Main challenge in securing wireless devices, according to In-Stat/MDR.


Related Articles

  • Mini me.  // Australian Personal Computer;Mar2004, Vol. 24 Issue 3, p32 

    Roughly the size of a compact mobile phone, the iPod mini packs 4GB of tunes onto a 1in Hitachi drive. Hand-me-downs from the classic iPod include the elegant interface; the 30-pin connector, which allows the mini to enjoy most standard iPod accessories; and a 32MB SDRAM chip to buffer music...

  • Device security demands precious processing power. Carson, Phil // RCR Wireless News;7/31/2006, Vol. 25 Issue 31, p12 

    This article focuses on the device-based security, which despite competing notions of stored data versus data-in-motion, has its role. Smart phones comprise only two percent of the handheld market in the U.S. Pointsec Mobile Technologies estimates that 60 percent of security breaches occur from...

  • Teens going mobile. Walsh, Mark // Crain's New York Business;08/07/2000, Vol. 16 Issue 32, p3 

    Discusses the growing popularity of cellular telephones and other wireless devices among teenagers in the United States. Alliances formed by youth-oriented Web sites with wireless network operators to extend their offerings to mobile devices; How the dearth of prepaid plans for cellular service...

  • Extreme mini PCs. Braue, David // Australian Personal Computer;Jan2005, Vol. 25 Issue 1, p20 

    This article reports that a 1GHzTransmeta Crusoe processor, 1.8in 20GB hard drive, accelerated graphics, 256MB of RAM, touch-sensitive screen, integrated 802.11 b and Bluetooth wireless, Ethernet, USB, FireWire, video out, and a range of other connectors are all contained within the 12.7 x 8.8 x...

  • Quit kidding around. Ankeny, Jason // Wireless Review;Apr2004, Vol. 21 Issue 4, p14 

    Comments on the teen market for mobile phones. Penetration rate of wireless phone in Norway's teen market; Danger in banking heavily on young subscribers; Importance of the market in over-25 age group.

  • Advertisers target teens via cell phones.  // RCR Wireless News;2/21/2005, Vol. 24 Issue 8, p11 

    Presents the results of a study on cellular telephone advertisements as of February 2005. Percentage of teenagers receiving advertisements on their handsets; Implication of wireless marketing technology for advertisers.

  • ONE MONTH'S TELECOM RESEARCH.  // Telecom Asia;Aug2009, Vol. 20 Issue 7, p15 

    The article presents several research related to telecommunication. One research shows the increase in demand for mobile security due to the significant rise of smartphones demand in the market and the popularity of the Palm Pre and iPhone. Another research also reveals the role of the operating...

  • The need for device-based security is higher than ever. Gallant, Robert // Portable Design;Jan2005, Vol. 11 Issue 1, p24 

    The article reports that as organizations become more reliant on wireless technologies--and individuals suffer the painful consequences of identity theft and other cyber crimes--the need for device-based security is obvious. Enterprises have their own needs, for instance, to securely extend the...

  • Hello, Phone Worms. Pape, Eric; Brown, Frank // Newsweek (Atlantic Edition);6/28/2004 (Atlantic Edition), Vol. 143 Issue 26, p6 

    This article reports the outbreak of cellular telephone viruses. We're all used to viruses' infecting our PCs. Now we might have to worry about their infiltrating our mobile phones, too. Last week the first known phone worm hit mobiles around the globe.The worm was written by underground Czech...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics