Briefs: IDC names Top 10 wireless rising stars

Apr 04, 2006

There are 10 wireless companies to keep an eye out for as the sector continues to evolve rapidly in terms of technology and content, a research group said.

Information technology research group IDC named Adamind, Cbeyond, Enpocket, Kargo, Kodiak, Limelife, mFoundry, Mobiltec, Vercuity and Visage Mobile as the companies to keep close tabs on in coming years.

"The companies chosen echo three broad themes for 2006: the growth of content markets and the consequent complexity of wireless content ecosystems; a pronounced need to remember that end-user experiences will have a profound impact on data adoption and ultimately customer loyalty; and the need to better serve the needs of business customers, especially small and medium-sized businesses," IDC reported.

Copyright 2006 by United Press International

Explore further: Five ways unmanned drones could affect the American food supply

add to favorites email to friend print save as pdf

Related Stories

At CES, 'Internet of Things' showcases the connected life

Jan 07, 2015

Everywhere you look at CES, it seems there's nothing that can't be connected to the Internet: Tennis rackets, coffee makers, watches, jewelry, baby clothing, pet accessories, oven ranges and infinitely more appliances and ...

Bezos: Fire phone offers 'something different'

Jun 19, 2014

There are two ways to view the smartphone Amazon introduced to the world: It's either the latest in a long line of indistinguishable devices or a magic wand for shopaholics.

Recommended for you

WikiLeaks accuses Google of handing over emails to US

5 hours ago

Whistleblowing site WikiLeaks on Monday accused Google of handing over the emails and electronic data of its senior staff to the US authorities without providing notification until almost three years later.

How we can each fight cybercrime with smarter habits

7 hours ago

Hackers gain access to computers and networks by exploiting the weaknesses in our cyber behaviors. Many attacks use simple phishing schemes – the hacker sends an email that appears to come from a trusted ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.