• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Wireless

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Wireless

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.
Results 351 - 375 of 1925Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Oct 29, 2015
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : 
corporate training apps, mobility, mobile, mobile learning, training
    
Adobe
By: Aerohive     Published Date: Oct 27, 2015
This webinar is for IT professionals looking to learn about, implement or expand wireless networks in their organization.
Tags : 
networking, mobile computing, wifi, wireless application software, wireless infrastructure
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
This webinar is for IT professionals looking to learn about, implement or expand wireless networks in their organization.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
Questo webinar è rivolto a specialisti IT interessati ad apprendere, implementare ed espandere le reti wireless nella propria organizzazione.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
Das Webinar richtet sich an IT-Spezialisten, die mehr über die Möglichkeiten im Bereich WLAN erfahren möchten bzw. an Organisationen, die planen, WLAN einzusetzen oder ihre bestehende WLAN-Infrastruktur zu erneuern.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
Detta webbseminarium är avsett för IT-proffs som vill lära sig mer om, implementera eller utöka de trådlösa nätverken i sin organisation.
Tags : 
networking, wifi, wireless application software, wireless hardware, wireless infrastructure
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
This webinar is for IT professionals looking to learn about, implement or expand wireless networks in their organization.
Tags : 
networking, wifi, wireless application software, wireless hardware, wireless infrastructure
    
Aerohive
By: Aerohive     Published Date: Oct 27, 2015
El seminario es para profesionales de IT que deseen aprender, implementar o ampliar redes inalámbricas en sus organizaciones.
Tags : 
networking, wifi, wireless application software, wireless hardware, wireless infrastructure
    
Aerohive
By: Aerohive     Published Date: Oct 26, 2015
Join this webinar to learn: - What the latest solution offerings look like and how to avoid investing in dead technology - Why more vendors are using the cloud to drive technical and commercial flexibility for organisations - How to easily grow your network with demand
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection
    
Venafi
By: Alcatel-Lucent     Published Date: Oct 22, 2015
A business rationale paper for multiple system operators (MSOs)
Tags : 
alcatel lucent, vrgw, broadband, broadband access network, service delivery
    
Alcatel-Lucent
By: Ruckus Wireless     Published Date: Oct 21, 2015
Before you make a long term investment in your wi-fi infrastructure let us tell you the real story. After reading this paper you can make an informed decision by asking all the right questions.
Tags : 
wi-fi capability, digital education, e-rate expansion funding, wi-fi deployment, wifi
    
Ruckus Wireless
By: Juniper Networks     Published Date: Oct 20, 2015
In today’s world, your firewall must be able to take immediate action based on known or emerging intelligence.
Tags : 
juniper, cloud, data center, security intelligence, networking
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
The SRX Series features a carrier-grade next-generation firewall with layered security services such as application security, unified threat management (UTM), integrated IPS, and advanced integrated threat intelligence to guard against cyber threats and malware.
Tags : 
juniper, network, srx, gateway, reliability analysis
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
The last few years have seen a rapid move to virtualization and cloud technology.
Tags : 
juniper, vfx, virtualization, gartner, idc
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : 
juniper, firewall, packet, filter, security
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
Over the years and across industries, it has been proven that increased automation leads to greater efficiency, enhanced productivity and a more agile way of doing business. The same is true for IT: as budgets dwindle, or become stretched to cover a greater range of responsibilities, the need for automation becomes more pronounced.
Tags : 
juniper, network, automation, efficiency, productivity
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
Customers looking to cloud technologies for better application agility and more efficient support of their entire IT operations are finding that broader use of virtualization across hardware is fundamental to achieving these goals.
Tags : 
juniper, software, data center, cloud, vmware
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization
    
Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago – the cloud, for instance. However, with every new technology – cloud included – there are new security challenges. With huge numbers of users, devices and data deployed to take advantage of the latest technologies, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks and network instability.
Tags : 
juniper, security, network, enterprise, cloud
    
Juniper Networks
By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses
    
Cisco
By: Cisco     Published Date: Oct 14, 2015
Malware knows no boundaries. Neither should your advanced malware protection solution. Cisco offers the industry’s broadest portfolio of Advanced Malware Protection (AMP) products available for all enforcement points in the extended network wherever threats can manifest: endpoints, network appliances, secure content gateways, mobile devices, and virtual environments.
Tags : 
cisco, malware protection, security, nss, malware protection solution
    
Cisco
By: GE Healthcare     Published Date: Oct 14, 2015
Download this Interactive Resource Guide today to learn more about the role GE Healthcare plays in optimizing healthcare organizations’ investment in imaging IT to help streamline healthcare costs, increase diagnostic confidence and enhance the quality of patient care.
Tags : 
gneral electric, ge helathcare, imaging, workglow, centricity
    
GE Healthcare
By: Sophos     Published Date: Oct 14, 2015
This whitepaper aims to dispel the fear and confusion surrounding encryption. It demonstrates how organizations can move forward with an encryption strategy in a manner that is simple, practical and achievable. So let’s start by setting the record straight on a few myths.
Tags : 
guide to encryption, data breaches, cyber attacks, myths of encryption, security
    
Sophos
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End


Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN

Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter