Subscribe to Wireless Week Articles
View Sample

FREE Email Newsletter

Design Daily

Rich Communications Suite – Can the Initiative Realize Success?

April 26, 2012 7:25 am | by Jamie de Guerre, Cloudmark | Comments

For RCS to be a success, operators need to address the security of the channel from the outset, ensuring that spam or malicious messages are stopped before they get to the subscribers.


Monetizing OTT Multi-Screen Video

April 18, 2012 8:28 am | by John Clancy, Azuki Systems | Comments

To co-exist and thrive in the TV Everywhere (TVE) ecosystem of the future, service providers must work hand-in-hand with content owners to satisfy consumers’ expectations and build a differentiated service model based on the demand for access to content on any device and at any time.


Improving Network Intelligence When Migrating to IP Networks

April 12, 2012 8:52 am | by Doug Fantuzzi, JDSU | Comments

As wireless operators migrate to modern networks that are handling significantly higher bandwidth and traffic, improved network intelligence moves from being a competitive advantage to becoming mandatory for efficient management and adequate quality of service.


It’s Time for Managing Data on the Mobile Internet

April 11, 2012 7:34 am | by Michael Luna, SEVEN Networks | Comments

The wired Internet has content delivery networks – now’s the time to look at what will work with wireless data.


Successfully Marketing Your Business with a Mobile App

April 6, 2012 11:58 am | by Terry Kilby, MGH | Comments

There are a few things that can make a huge difference when marketing your business with a mobile app.


IT Execs Need to Embrace Mobility, Stat

April 6, 2012 11:52 am | by Jason Parry, Force 3 | Comments

Any IT executive who hasn’t spent the past few years living in a cave knows the truth: The integration of personal mobile technology into the workplace is happening, and nothing is going to stop it.


Why Operators Need to Embrace Their ARPU Eaters

April 6, 2012 11:48 am | by Andreas Bernstrom, Rebtel | Comments

If you can't beat ’em, join ’em. Why operators need to get closer to their ARPU eaters.


TD-LTE: Ready for Liftoff

March 14, 2012 12:48 pm | by Maisie Ramsay | Comments

With China Mobile sent back to the bench, does that mean TD-LTE is out of the running? Not by a long shot.


FeedHenry: Mobile Security is More Than Luck O’ the Irish

March 14, 2012 12:45 pm | by Andrew Berg | Comments

Cathal McGloin, CEO of FeedHenry, an Irish company that makes an enterprise grade mobile software platform, sat down with Wireless Week to talk about how a new software distribution model (app stores), a BYOD culture and the cloud have combined


Late Adoption: Text to 911

March 13, 2012 10:38 am | by Maisie Ramsay | Comments

Take out your phone and try to put a text through to 911. Unless you’re in Iowa or a single city in North Carolina, it won’t go anywhere.

Wireless Finance, Engineering Teams Need to Work Together

March 7, 2012 7:07 pm | by Andy Sealock, Pace Harmon | Comments

A well-coordinated finance and engineering partnership can help navigate wireless technology complexities by developing a predictive financial model analysis to ensure that cost, scalability and technical viability are accurately modeled...


The ABCs of Capacity: Add Sectors, Boost Backhaul and Condense Cells

March 6, 2012 7:09 pm | by Stephen C. King, 3M | Comments

Mobile device manufacturers are churning out products that can squeeze more and more bits per hertz from the spectrum, and consumers are buying them by the millions, often resulting in overloaded networks and sluggish or interrupted service.


Snapshots from Mobile World Congress 2012

February 29, 2012 11:12 am | by Monica Alleven | Comments

Here are some scenes from Mobile World Congress in Barcelona, Spain ...


The Note: Tablet, Smartphone or Both?

February 17, 2012 7:58 pm | by Andrew Berg | Comments

The LTE-capable Galaxy Note for AT&T comes running Android 2.3 (Gingerbread), which Samsung says will be upgradeable to Ice Cream Sandwich, and packs a whopping 1.5 GHz dual-core processor. The battery is one of the larger ones on the market...


The Consumerization of IT: Preventing a Security Nightmare

February 15, 2012 11:21 am | by Steve Durbin, Information Security Forum | Comments

Unfortunately, many of today's most popular mobile phones and tablets weren't designed from the start as business tools and therefore do not offer the level of security comparable to present-day desktop and laptop computers.



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.