Search
Related Links

 

 

Informative Articles

3 Quick and Easy Steps to Earn Money Online NOW!
The Internet is the world's largest and newest marketplace, but it has been saturated with so many sellers that it can be hard to tell scams from the real thing, and even harder to break into the market and sell your wares. It is not uncommon...

Cisco CCNA Certification: Becoming A Truly Valuable CCNA
I've been active in the Cisco Certification track for four years, working my way from the CCNA to the coveted Cisco Certified Internetwork Expert title, and during that time I've conducted job interviews and casual conversations with hundreds of...

The Evolution of Technology - The History of Computers
While computers are now an important part of the lives of human beings, there was a time where computers did not exist. Knowing the history of computers and how much progression has been made can help you understand just how complicated and...

Wardriving Ethics
War-Driving Background Information In order to start to understand what War-Driving is, some information needs to be explained. Wireless networking is a fairly new technology which is being used all over the world. Both home users and business...

Wireless: The new trend in Computer Rentals and Projector Rentals
Going wireless is easy with a Tech Travel Agent© from Rentacomputer.com. Just tell them what you want to do wirelessly. Your Tech Travel Agent© will provide you with a quotation for everything you need without all the technical jargon. You...

 
How To Bridge The Digital Divide

How To Bridge The Digital Divide

GIVE THE GIFT OF COMPUTERIZATION
START A COMPUTER CLUB AT YOUR BANK TODAY

The digital divide is the space in our society between the computerized and the non-computerized. The digital divide is dangerous, yet can be made safe if we all just work together to build a bridge to cyber freedom.

When the problem is a lack of adequate computerization, the solution is simply to adequately computerize. Web conferencing, computer enriched literacy programs and organizational participation can dramatically help transform the digital divide into opportunities wide.

We live in a world of technology haves and have-nots. Like A Tale Of Two Cities, failure to address the issues can result in creating a future resembling The Time Machine. Since we never know who’s life experience will hold the key to solving the problems of disease, environmental destruction, economic empowerment, or our next really good laugh, we can’t afford to leave anybody behind who wants to participate in the Information Age Evolution.

The evidence is too precise to ignore. Maximizing cyber opportunities is critical to the success of any economy. Make no mistake about it. Second hand information in the information age is truly the new slavery. If you have to go to another for your daily data, by the time you get it, if you get it, it’s old news. Many companies only have additional product information on the web. Talk about second-class status.

The solution involves access to both equipment and education. For example, internet access without the confidence and ability to effectively use the technology, is like having a microphone and not know how to turn it on or what to say. Though I’ve trained thousands how to use a computer at no financial cost, I’m still astounded at the number of people who don’t have a clue how to use a computer. What’s even more amazing to me are the people who have gone to traditional computer classes and still don’t have a grasp on how to benefit from computer use. My training notes are posted at http://www.compurest.com. Click on Free MS Training.

Multi-level involvement of government, organizations and individuals is imperative. Computers are the keys out of Babylon, the next day in the genesis of our freedom as the human race. I have a theory that during WWII enough people chose good over evil so that we were given the power of computers. The Enigma Machine, an early computer, was developed by the Allies and used to break Hitler’s code, thereby turning the tide of the war. The power of our modern Enigma Machines, computers, has changed the tide in many lives in no less a dramatic fashion.

According to Genesis, during the time of Babylon’s ego, our language was confounded. With computers and their language translation capabilities, people from all over the world can speak and be understood. I’ll never be able to convey the joy on the face of a young man in Harlem the first time he communicated with a soul from Japan about a mutual artistic passion. Or the peace of senior Miss. Ruth who was able to communicate with younger members of her family in another state through a computer, which translated into them becoming even closer. Or the accomplishment of a young father building stronger communications bridges with his six-year-old daughter during conversations they would have while together at the computer screen. It no longer matters what one learned or did not learn in school. The information, the commodity of kings, is available to all who know how to use a computer, the Internet and an assortment of educational tools. As Anthony Robbins says in his book AWAKEN THE GIANT WITHIN…”I can’t overemphasize the power and value of gaining even one, single distinction – a sole piece of information – that can be used to change the course of your life. Information is power when it is acted upon, and one thing is that you never know when you’re going to get it.”

The difference between a computerized and non-computerized life is like the difference between a Mercedes and a mule. Take insurance. Via the web, one can quickly gain access to tools that compare up to the second insurance rates offered by a multitude of companies. Without the web, one usually relies on whatever print or phone information is available. Anyone can be a salesman with Yahoo Classified, a free product advertising service that gets around 12 million hits a day. Driving instructions, medical treatments, food information http://www.foodstop.com, breaking news, spirituality, sports, humor, art, http://www.audart.com, it’s all there.

I’ve been a computer diva for a quarter of a century. Back in the late ‘80’s Harlem’s great community service diva, Mother Clara Hale, told me that there was something going on with computers and I needed to come uptown to help people become computerized. I won’t repeat what she said about Harlem’s politicians on the issues.

It is time for effective leadership. I’m not dissin’ the folks in charge, just requesting they use computers to solve the problems the community is facing. Truthful information is a key. In the 80’s I was told by Harlem’s leadership that AIDS was not a Black problem. They said the best way to handle AIDS was to not talk about it. They’d put on another record, rather than have on Niro Markoff Asistent who’s book WHY I SURVIVE AIDS tells how she healed herself of HIV with ARC (aids related complex). In the 90’s, the politicians did little about the 5 open sewers that surround Harlem, the location of the majority of Manhattan’s bus depots in Harlem, the threat of the Hanta Virus or plague from the large rodent population, inadequate disaster relief programs or information available on how to deal with the dramas on hand. The Internet has some answers, but you have to know how to do a search or type in an address to find them.

When I lived in mid-town Manhattan in the 80’s and early-mid 90’s, I had many computer stores in walking distance of my apartments. When I went to Harlem in ’94, there was not one computer store…a place where you could “kick the tires”, try new technologies, and take a test drive of new software.

When I left Harlem in ’98, despite pleas to elected and appointed officials, Harlem still did not have a computer super store. Not even all the time spent on the Empowerment Zone helped. Instead, I was told that most people had no interest in computers or that computers were of the devil.

When I’d conduct ‘computer buying groups’, we had one Radio Shack in Harlem, close to Columbia University, which had an extremely limited computer selection and programs were minimal. We ended up having to go down town. When I came to Los Angeles in ’98 the same was true for Watts and Compton. My sister, Robin Hardin, reports the same is true in her city, Detroit. Are there many computers in Afghanistan? I doubt it with their reported 80% illiteracy rate.

Access to technology is meaningless until we learn how to use it to empower our lives.

The http://www.compurest.com training notes I mentioned earlier, plus one more class that I haven’t posted yet, were given to all who came to me to learn how to


compute. I stopped counting at 3,000 people over a four-year period, 1994-1998. I read that millions of dollars were raised for education during that time. I had to accomplish what I did on a $10,000 grant, plus whatever I earned and resources I had. More and better allocated financial and educational resources need to be committed to this issue. “Based on results” needs to be factored into funding and training qualification.

I provide that background to say that intervention is necessary to eliminate the digital divide. The divide, the space between people with computers and people without, is real and we must take steps to close it, and close it now, both nationally and internationally.

Here are a few recommendations on how to achieve that goal.

1. Encourage banks to set up “Cyber Clubs”, much like the “Christmas Clubs” where people can make deposits into an account for future technology purchases. As an alternative to giving a child a doll or game for a gift, take that money and deposit it into the account. These clubs can make group purchases during July 4th and Dr. King’s Birthday weekends offering additional buying incentives based on volume discount buying. They can also keep people informed of the newest, latest and most effective equipment and programs to purchase. Financial management, i.e. “computer banking” computer user groups can be formed to use the technology to enrich the community.

2. Provide incentives for community organizations to offer free computer training to their membership. Teach the basics necessary to write letters, get on and use the web, balance a budget or record one’s family tree. Encourage business growth. With a computer, whatever one does best, they can do as a business. For example, if someone braids hair, show them how their computer can keep their books, appointments, send out customer mailings, encourage word of mouth, file taxes, etc. Sales development clubs, on the web and off, can also encourage economic growth. These clubs can reach beyond national borders.

3. Hold more and targeted local, state and national and international “town meetings” on the web with elected and appointed officials answering questions and listening to solutions from constituents. Network ideas with resources and people to accomplish the mission.

4. Provide additional tax and financing incentives to open computer stores, training centers, wherever. It’s not just low-income people who need access and training. We all do. I still can’t believe the many times I heard “I never thought I would ever be able to use a computer,” or “I’ve never even touched a mouse”

5. Encourage intelligent, cross cultural-religious-economic-racial-gender, etc. computer use. With computers we see the quality of one’s ideas before we see the body they are in or the lifestyle they live. The opportunity to build bridges is to great to ignore.

6. Encourage non-violent conflict resolution through a computer. It’s tough to use a computer and a gun at the same time. Also arguments over modems cause less violence.

7. Promote the joy of computing.

8. Unconditionally computerize all. The only way that national testing of school children can work is if all children have access to the same information at the same time. All 14 years of school should be available on the web. Any child who goes through a web-based education should be able to pass the national standards test. This is not difficult if we allow the needs of the students to hold greater weight than the needs of the unions and school officials.

The systems for success are already in place. Community organizations, one-on-one at home sharing information, economic encouragement and technology already exist to expedite the process. With sponsorship opportunities for computer hardware, software and humanwear, the process can pay for itself via an empowered tax base.

Dr. Martin Luther King was right. In my experience, which began on computers in 1977 at ABC Radio’s WPLJ-FM, the table of brotherhood that Dr. King spoke of in his I HAVE A DREAM speech is a table with a computer on it, and good people around it, using it to solve problems and have a good time. Just like he was a champion of civil rights, we must all become champions of cyber rights. Government, business, non-profits and individual intervention will not only close the digital divide, but where there was a hole in the ground, new opportunities will be found.

The real lesson from the original American Underground Railroad is that those who have freedom, have a responsibility to share that freedom with those who do not. Until that’s accomplished, we’re just a slave system in another form. When that is accomplished, everyone is free with the help of ‘a friend of a friend.’ Free to understand, grow, pray and prosper.

How does one champion cyber rights? If you know how to use a computer, find someone in your life that does not know and teach him or her. If you don’t know how to use a computer, find someone who does and ask them to teach you. Help your organizations and institutions become computerized too. Everyone has something to contribute. I personally recommend beginning with each individual saying their own prayers for divinely guided computerization.

Regarding the question can anybody learn computers, bring to mind the image of an illiterate person who has already learned how to read the screens and push the buttons on their ATM. We are limited only by our imaginations.

Finally, a message from Miss. Roxanna Dawson. I had issued a challenge to Harlem that I was actively looking for the first person I could not train how to use a PC. Since the cost of the training is that it be passed onto at least two other people, I could not back up the challenge with money, but thousands of the people came anyway over a four-year period. Roxanna, at 92 years old, came and said she was that person I could not train. I asked her why and she said because she was blind. I asked her if she was totally blind or legally blind. I had read Huxley’s THE ART OF SEEING so I know the difference. I put Roxanna’s fingers on the home row keys and had her type her name. I made the type big and she jumped back from the screen and yelled, “I can see.” The people in the training room at Minisink Townhouse went electric. She turned around and said with a smile of deep pride, “If I can do it, the rest of your have no excuse.” For her second lesson, I sat her at a computer with a 26-year-old woman and they learned how to use a mouse together. In between practice and laughter, they talked about community issues at a level that’s helped me grow ever since. Healing can be found in networking.

In summary, since the cause of the problem is a lack of adequate computerization, the solution is simple – computerize. It’s easier than it seems, and when done right, its rewards are tremendous.

Happy Computing

J. Nayer Hardin is the founder of Computer Underground Railroad Ent. Nayer created a style of free computer training, How To Compute www.geocities.com/computerjoint, that’s helped over 3,000 people between the ages of 4 and 92 learn how to use a personal computer.

The training was covered on New York’s WOR-TV in 1997 and her classes were featured on local cable shows including Harlem’s Winston Gilchrist Show.


 

Computer networking - Wikipedia, the free encyclopedia
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ...
en.wikipedia.org
 
Social network - Wikipedia, the free encyclopedia
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ...
en.wikipedia.org
 
Networking on the Network
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ...
polaris.gseis.ucla.edu
 
Computer Networking - Wireless Networks - Home and Wireless ...
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting.
compnetworking.about.com
 
ITtoolbox Networking Knowledge Base
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ...
networking.ittoolbox.com
 
Howstuffworks "How Home Networking Works"
How home networking works and the different methods to create a home network.
www.howstuffworks.com
 
SmallNetBuilder
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users.
www.smallnetbuilder.com
 
Network Computing - Computer Networking, Network Security and ...
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ...
www.networkcomputing.com
 
CareerJournal | Career Networking - Professional Network ...
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career.
www.careerjournal.com
 
Trail: Custom Networking (The Java™ Tutorials)
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ...
java.sun.com
 
Windows Server 2003, Longhorn Server & Vista Networking Articles
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ...
www.windowsnetworking.com
 
IBM Networking | IBM Networking
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ...
www.networking.ibm.com
 
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ...
www.computerworld.com
 
HP Networking products and solutions
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ...
www.hp.com
 
Monster: Networking
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ...
content.monster.com
 
Access | CNET News.com
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ...
news.com.com
 
Network Management: Covering today's Network topics
Find the latest information on Network Management, Network Security, Network Design and more.
searchnetworking.techtarget.com
 
cisco networking academy program
cisco.netacad.net/ - 1k - Cached - Similar pages
 
Networking and Your Job Search: The Riley Guide
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ...
www.rileyguide.com
 
NetworkWorld.com
Networking news, reviews, opinions and forums from the Leader in Network Knowledge.
www.networkworld.com
 
 

 

Content Menu
  • 10 effective ways to reduce your business costs

  • 10 secret ways of getting your website listed on google

  • 10 simple ways to expand your subscriber list

  • 10 successful strategies to site promotion

  • 10 things to ponder before moving your office network

  • 13 point business development plan for it professionals

  • 15 ways to promote elearning programs

  • 2much hosts webmaster access blow out

  • 2much success delays livecamnetwork upgrade

  • 3 quick and easy steps to earn money online now

  • 3 simple steps to internet home business promotion

  • 3 summer computer tips

  • 3 tips to fix unreliable wireless connections

  • 4 computer money saving tips

  • 5 reasons why you need a wireless network

  • 5 simple ways to increase your computer speed

  • 5 stress reducing computer tips

  • 5 things you need to know before deciding on a certification training

  • 5 ways to make your resume shine on line

  • 6 essential steps to protect your computer on the internet for free

  • 7 key items to include in your email signature file

  • 9 steps to protect your ms windows system from viruses

  • 9 ways to get an mcse or cne without wasting 5000

  • about centralized computer systems

  • advanced wireless networking

  • advance online networking getting others to read your emails

  • adware is it safe

  • affiliates need to read their newspaper

  • affiliate profits 101 how to earn your first dollars as an affiliate

  • all about the new scmad certification exam

  • an introduction to text messaging

  • aoe adult online europe amsterdam is calling

  • apple mac mini it fits anywhere it is the most affordable mac ever

  • are affiliate programs the buried treasure of the internet

  • are you overlooking the gold in your email folders

  • article banks and google alerts harness your publishing power

  • a graphic designers top ten resolutions for 2005

  • a graphic designer s top ten resolutions for 2005

  • a toolbar for each

  • band promotion book your garage band some shows or gigs

  • basic diagnosis guidelines for your pc

  • basic problem in a pc

  • becoming a truly valuable ccna

  • beware of spyware

  • bigsquid rfid leading rfid solution in india

  • blogging for personal benefits

  • blogging your way to benefits

  • blogs i wanna have my blogs

  • bluetooth personal wireless networking

  • boost your websites search engine rankings in 5 simple steps

  • bring your visitors back clamoring for more

  • bring your visitors back clamoring for more maintain and improve your web site weekly

  • broadband and internet 101

  • building a wireless network in your home

  • business needs vs network performance critical challenges facing network managers

  • buying a laptop computer

  • buying a laptop that you can use as a personal assistant

  • bypass proxy firewall 100 java http tunnel for anonymous surfing

  • ccna 640 801 certification primer

  • ccna 640 801 preparation and exam review

  • ccna 640 801 preparation exam review

  • ccna icnd ccna intro or 640 801 how to choose

  • certwatch 2006

  • cisco ccna ccnp home labs developing troubleshooting skills

  • cisco ccna ccnp home lab how to configure reverse telnet

  • cisco ccna ccnp home lab setup how to configure reverse telnet

  • cisco ccna certification becoming a truly valuable ccna

  • cisco ccna certification broadcasts unicasts and multicasts

  • cisco ccna certification should you take the one exam or two exam approach

  • cisco certification becoming a real ccna

  • cisco certification becoming a truly valuable ccna

  • cisco certification cabling cisco devices

  • cisco certification ccna candidate faq

  • cisco certification in what order should you take your ccnp exams

  • cisco certification taking your first certification exam

  • cisco certification the cisco three layered hierarchical model

  • cisco certification the osi model isnt just for exams anymore

  • cleaning your computer

  • computers and web cams are taking communication to levels only imagined in sci fi novels

  • computer networking consultants

  • computer network designing

  • computer network installation

  • computer phone voip pathology is preventable

  • computer tips that help small businesses operate profitably

  • connecting linux to the internet

  • creating a wireless home network

  • cut the wires

  • data security are your assets secure

  • dealing with digital disease

  • design matters in our visual culture

  • desktop security software risks part 1

  • digital dispatch is the internet safe

  • disgusted with dialup compare dsl providers cable and satellite internet to see if one is right for you

  • does your event need to be live

  • domains your friendly address on the internet

  • domain registration for great search engine ranking

  • do you know that spyware nuker is a malware itself

  • email marketing lesson starbucks a sexy lady and my search for the ezine

  • erp implementation success factors

  • ez link trading

  • e merging books

  • fast ways to reduce business costs

  • finding a good pc remote control solution

  • finding what you need

  • find the online business made for you 7 steps to set you free

  • five proven methods for increased internet sales

  • five proven methods for internet marketing success

  • five proven ways to increase internet sales

  • five reasons to do wireless networking

  • fleet maintenance software reviews

  • fraud not taken seriously

  • freedom and responsibility on the internet

  • freight broker software

  • freight software

  • get the boot a birds eye look into mcse boot camps

  • good computer maintenance part two

  • google the next step in im

  • got spyware tips for detection removal and prevention

  • hetman will help you conquer your files quickly and effectively

  • how do wireless networks work

  • how to become an internet marketing guru

  • how to bridge the digital divide

  • how to choose the best laptop accessories

  • how to combat spyware

  • how to eliminate spyware adware and pop up ads for free

  • how to obtain free advertising for your online business

  • how to pass ccna 6 steps to success

  • how to protect yourself from viruses adware spyware and hackers

  • how to really install a modem

  • how to stop spyware from infecting your system

  • hpc systems inc announces first 8 way processor amd opterone server

  • ideal connection builder for small businesses

  • improve your profile make more friends

  • increasing the range of your wireless access points

  • index

  • information technology degrees

  • internet2 a future so bright

  • internetworking overview

  • internet a medium or a message

  • internet a whole new world wide web including video and audio

  • intranet

  • introduction to cisco networking the osi model part i

  • introduction to isdn part iii pap

  • iscsi vs fc for meeting mission critical requirements

  • is it still good to share

  • is spyware watching you

  • is your computer sick

  • is your computer slow and sluggish take these steps to speed it up

  • is your laptop or home computer wireless enabled

  • is your network security and user access in the right balance

  • it skills and certification

  • i dont need a website do i

  • join the internet shopping bandwagon

  • keeping it clean virus removal basics

  • keeping your pc healthy at little or no cost

  • keeping your website in top condition 5 easy tips for maintaining a streamline site

  • kill the messenger service

  • laptop computers and the pvp effect

  • laptop computer extras for the mobile traveler

  • lavasfot ad aware free spyware removal

  • life in cyberspace

  • link building for a new web site

  • linux web hosting

  • living life loud

  • maximizing email security roi stop spam and save

  • maybe you already have wireless and dont know it

  • mcse 70 290 certification primer

  • microsoft and history of windows

  • microsoft business solutions var partner selection overview for it director manager controller

  • microsoft great plains implementation tailoring local versus remote support

  • microsoft great plains partner selection overview

  • modern scams online

  • my space is your space myspace com

  • my top 5 stock pick sources for 2005

  • networking basics

  • networking structures explained access point or ad hoc

  • network marketing success starts with you

  • network to find experts and insider tips

  • network wiring standards

  • overcoming small business networks sales objections

  • passing ciscos ccna and ccnp exams ping and extended ping

  • personal wireless with bluetooth

  • photo plus 2005

  • preparing for a career in information technology

  • printing troubleshooting guide

  • product reviews windows xp

  • protection for your computer system painless and free

  • protection for your pc painless and free

  • protect your system from the internet evils

  • qarea announces its wireless casino ready for stress testing on pda and cell phones

  • quick guide to computer training

  • read up on dial up

  • real estate investments that increase your net worth

  • reasons to start a wireless network

  • recognizing a pc with malware

  • remove rogue desktop icons created by spyware

  • report on growth and economic impact of the it industry

  • rf engineering for 802 11 wlan

  • risks of desktop software 1

  • risks of desktop software part 1

  • road warrior at risk the dangers of ad hoc wireless networking

  • rotator

  • sci fi communications at home

  • screenshots vista windows

  • search engine marketing john alexander interviews seo author susan oneil about the early days

  • secrets to spyproofing your computer in four easy steps

  • secure your data windows data backup computer software

  • selecting a cell phone

  • selecting a laptop

  • selecting a personal digital assistant

  • setting up a home network

  • setting up a network wired or wireless

  • setup a home wireless network a short tutorial

  • seven ways to speed up your pc

  • shop surf or send wireless home networks deliver the internet

  • simple tricks to maximize the reach of your marketing message

  • small business server business tips

  • software consulting

  • spam free marketing

  • spybot com spybot search destroy version 1 4

  • spys in cyberworld

  • spyware is hiding in your computer

  • spyware versus adware the difference impacts your privacy

  • spyware what it is and how to combat it

  • strategic internet marketing

  • successful myspace strategies

  • surfing searching networking 101

  • ten great careers for computer geeks

  • that darned old internet gateway

  • the advantages of becoming a master networker

  • the apple mac mini it fits anywhere and it is the most affordable mac ever

  • the best help desks on the internet

  • the birth of incident response the story of the first internet worm

  • the complete guide to spotting computer spies recording devices

  • the dark side of p2p file sharing

  • the evolution of technology the history of computers

  • the future of the web

  • the future of wireless networking

  • the google feedback loop for quality traffic

  • the history of computer

  • the importance of forum participation in promoting an internet business

  • the importance of protecting your pc from viruses and spam

  • the ins and outs of banner networking

  • the medium and the message

  • the metaphors of the net

  • the metaphors of the net part ii

  • the missing link of the internet

  • the next internet marketing gold rush

  • the perils of wireless networking

  • the power of the blog

  • the security risks and ways to decrease vulnerabilities in a 802 11b wireless environment

  • the solow paradox

  • the story of the first internet worm

  • three pronged trojan attack threatens security on the internet

  • time to redefine telecom

  • top 10 ways for web designers to find new clients

  • top 15 affiliate programs that pays top money

  • top 5 reasons to go wireless

  • transportation management software

  • transportation software

  • two enter internet battle

  • understanding the operation of mobile phone networks

  • using fiber patch cables

  • using the internet in your job search

  • verilan successfully interconnects seven carrier labs worldwide into one secure private network for optical internetworking forum oif worldwide interop demo at supercomm 2004

  • visual sciences an analysis software

  • voip a global telecommunications revolution

  • voip phone home

  • vulnerability assessment and network security

  • wardriving ethics

  • webcams science fiction becomes reality

  • web cams sci fi communication at home

  • weight loss for webmasters

  • whats your iq on basic pc phone voip knowledge

  • what certification should you pursue after the ccna

  • what exactly is an intel centrino mobile notebook

  • what is contract programming an alternative to the conformity of everyday employment

  • what is wireless networking

  • what is xbox360

  • what sms users are telling telcos

  • what will google do with 4 billion

  • when trade and community freedom starts to cost click on

  • which notebook computer has your name on it

  • why blog

  • why get a microsoft mcse certification

  • why join the information system security association

  • why learning the osi model is important and not just for exams

  • why over 90 of voip computer phone services are vulnerable to attack

  • wifi range what are the limits

  • wilibox launches embedded linux platform supporting ieee 802 11 ap and sta modes simultaneously

  • wilibox launches embedded linux wireless platform with industrys first 802 11 stack supporting access point and client modes simultaneously

  • windows task manager an overview

  • wired network working into wireless access points

  • wireless alphabet soup whats the difference anyway

  • wireless home networking choosing the right one

  • wireless home networking what you should know

  • wireless installation checklist

  • wireless internet comes to lasvegas net

  • wireless internet terminology confusion or clarity

  • wireless jargon glossary

  • wireless network

  • wireless networking basics

  • wireless networking cards a closer look

  • wireless networking explained

  • wireless networks how do they work

  • wireless shopping with rfid

  • wireless the future of connecting to the internet

  • wireless the new trend in computer rentals and projector rentals

  • wireless wonders and waterfall watches

  • wi fi networking what to look for range speed and standards

  • wi fi wireless fidelity description

  • women entrepreneurs in internet marketing

  • yawna yet another wireless networking article

  • your affiliate business peripherals software computers