Wireless
- 21
- WAVES Lab
- Wireless communication research group at Michigan State University. Includes list of members and publications.
- 23
- BlueHoc Simulator
- Bluetooth performance evaluation tool. Includes a manual, tutorial, capacity and performance presentations.
- 24
- How Stuff Works: Bluetooth
- Concise description of the Bluetooth wireless technology, including problems and interference, with related links.
- 25
- The Wireless Directory
- Includes news, products, learning resources, manufacturers, software developers, distributors, and a discussion forum.
- 26
- XMFan.com
- Moderated satellite radio discussion board focused on XM hardware, setup, and installation.
- 27
- Digisat, Inc.
- Digisat, Inc. offers turnkey satellite communications systems, Internet connectivity, VOIP network, new and used equipment.
- 28
- Foxcom Fiberoptics
- Bringing fiber optic technology, RF over fiber systems, and HFC broadband network solutions for all related fiber-optic companies.
- 29
- Intellcom Limited
- Satellite solutions for small and medium size enterprises to share high speed Internet access over the LAN.
- 31
- Lloyd's Satellite Constellations
- Information on Iridium, Teledesic, Globalstar, Orbcomm, ICO Global, Ellipso, Skybridge as well as general information on satellites.
- 32
- SaVi satellite constellation visualization
- Software to simulate satellite constellations, such as ICO, Teledesic and other systems mentioned in this directory, in two and three dimensions.
- 33
- The Saudi Network
- Article describing system benefits. Includes VSAT acronyms, and FAQs on the technology, equipment, regulations, and licensing .
- 35
- Ars Technica: Wireless Security Blackpaper
- Article covering basic 802.11b security, WEP, MAC address filtering, broadcast key rotation and EAP based standards.
- 36
- Securing Your Wireless Network
- Tips for home users to secure their wireless LAN, with detailed instructions on how to execute each step of the process.
- 37
- Wireless Home Network Security Tips
- Tips for home users who want to get a network up quickly to secure their network against the most prevalent of threats.
- 38
- New Scientist
- Article by Will Knight, discussing a new authentication approach that can combat the risks associated with connecting to a rogue access point. (February 20, 2005)