Use Your Mobile Phone To Create Your Own Wi-Fi Hotspot - InformationWeek
IoT
IoT
Infrastructure
News
12/5/2007
11:52 AM
50%
50%

Use Your Mobile Phone To Create Your Own Wi-Fi Hotspot

CradlePoint's pocket-sized PHS300 can be combined with a 3G cellular modem or 3G handset to create its own access point.

Mobile phone users with broadband wireless access can create a portable Wi-Fi hotspot through the use of a pocket-size portable EVDO device unveiled this week by CradlePoint.




The PHS300 is an EVDO device that creates a fully portable Wi-Fi hotspot from 3G phones or modems.
Similar in function to home office and small office Wi-Fi routers, the pocket-sized PHS300 can be combined with a 3G cellular modem or 3G handset to create its own access point.

"Plugging a phone or modem into the PHS creates an instant hotspot for consumers and enterprises that is flexible, reliable and secure," said Gary Oliverio, CradlePoint's co-founder and VP of marketing, in a statement. "With the PHS300, shared Internet access is simple and available at higher speeds with virtually unlimited coverage."

The device, which is available starting this week, carries a suggested retail price of $179. The PHS' intuitive software requires no special installation by users and connects at broadband speeds to PCs, PDAs, MP3 players, gaming devices and smart phones.

CradlePoint said the PHS -- the PHS stands for "personal hotspot" -- connects users of Wi-Fi-enabled devices at broadband speeds. The PHS is powered by an AC adapter or by a user-replaceable lithium-ion battery.

The company said the device can be used with some Verizon Wireless and Sprint data plans operating with USB modems manufactured by Sierra Wireless, Novatel Wireless and Franklin Wireless. Also, some smart phones, PDAs, and Blackberries can be used with the PHS.

Based in Boise, Idaho, CradlePoint also makes docking cradles, cellular routers, and support software. The company's branded technology is called WiPipe and is marketed to mobile business customers and emergency responders looking for online access and traffic management functions.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll