- Security Breach: Wireless Networks Less Than Secure. Platis, Athena // Rural Telecommunications;Nov/Dec2001, Vol. 20 Issue 6, p50
Addresses several issues concerning wireless network security. Difficulties with mobile wireless telecommunications in the United States; Forms of threats to mobile wireless networks; Solutions to spam in mobile networks. INSET: THE BIG PICTURE.
- TECH-INDUCED TRANQUILITY. Savetz, Kevin // NEA Today;Nov2007, Vol. 26 Issue 3, p45
The article describes some technologies that can help educators in the U.S. avoid and handle junk electronic mail messages, demanding mobile phones and overburdened schedule-keepers. If junk mail is rampant, a better spam filter can separate unwanted mail messages. SpamSieve and the Mail-Washer...
- Bridging The Mobile Internet Gap. Achar, Aparna // Wireless Week;07/10/2000, Vol. 6 Issue 28, p16
Features Indian company Unimobile.com which has ventured into the mobile Internet market in the United States. How its Mobile service works; Venture capital received by the company; Partners of Unimobile in India; Consumers targeted by the company.
- Elsewhere in the IEEE Computer Society. // IEEE Internet Computing;Jan/Feb2007, Vol. 11 Issue 1, p15
The article offers news briefs on the computer industry. Queen bots are used by hackers to launch spam, phishing or denial of service attacks. Mobile phone carriers are working to introduce dual-mode phones that will automatically switch cellular calls to Wi-Fi networks and back when users come...
- A new economic theory. Jackson, Donny // Mobile Radio Technology;Apr2007, Vol. 25 Issue 4, p60
The article reports on the services offered by Mobile Campus to university students in the U.S. The company has created a business model to solve the financial issue by letting advertisers give advantageous promotions to them. Aside from helping students to communicate with one another,...
- Mobile spam alert. Burke, Daniel // Telecommunications - International Edition;Aug2006, Vol. 40 Issue 8, p16
The article reports on the virus and spam problems that comes along with technology in the mobile industry. Mobile phones are becoming the target of spammers who seek disruption of services by taking advantage of the ambiguities in mobile network specifications and glitches in portable devices....
- Icstis calls aggregators to self-regulate against spam. // New Media Age;10/30/2003, p7
Focuses on an appeal by premium rate regulator Icstis for he mobile aggregator industry to develop a code of practice to help it self-regulate effectively against spam and scams. Statement issued by Icstis director George Kidd; Responsibility of aggregators.
- Mobile users open to Bluetooth ads. // New Media Age;12/11/2003, p13
Offers information on a survey conducted by technology agency Rainer PR on mobile telephone users' willingness to accept promotional messages via Bluetooth. Users' level of awareness of the technology; Attitude toward spam; Key to the success of the technology.
- Chalkface. // e.learning age;Oct2011, p20
The article discusses issues relating to electronic learning (e-learning). A study by the Home Learning College reveals that some adults require regular doses of sugar and caffeine to learn. Another study by Texas Instruments DLP Products found that three-dimensional (3D) tools have a positive...