The mobile market continues to evolve at a blindingly fast pace. It seems that new faster, sleeker, and more powerful mobile devices are launched every day, with new device categories created almost overnight. The number of available applications to
Retailing has always been a tough business. But, the move to online shopping, the challenging economy and changes in shopper’s behavior has placed even more pressure on traditional retail margins. Retailers are constantly looking for ways to get
In the decade or so that Wi-Fi has existed, most technologists and mobile industry executives viewed it as the “poor cousin” to licensed mobile communications. Now mobile operators around the world are asking how they can effectively use Wi-Fi to
Wi-Fi networks seem to now be everywhere. Once primarily confined to the home or office, we now expect Wi-Fi access in coffee shops, hotels, airports, stores and even in sport stadiums. Not only are these Wi-Fi networks providing valuable Internet
The insatiable demand for smartphones, tablets, and other connected devices is generating staggering amounts of mobile data and placing a crushing burden on networks. One barometer is the recently released Cisco Visual Networking Index (VNI), which
English poet John Donne said, “No man is an island, entire of itself.” The same could be said for a man’s — or woman’s — home network, which today is no longer his or hers alone. Friends and family increasingly expect to be able to connect their
For much of Wi-Fi’s history, technologists and mobile industry executives viewed it as the “poor cousin” to licensed mobile communications. Today, all that is changing with the explosive demand for mobile data, the proliferation of new and powerful
Mobile carriers face no shortage of pain points as new data streams create unprecedented and staggering amounts of information. But it is important to remember that pain points often arrive in tandem with new opportunities. From my perspective
Employees, and many business, want to allow personal devices to be used at work, and potentially for work. However, balancing that with corporate policies for information security, clear rights-of-use, liability, and then bounding it within an