Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 1925Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco, remote access, remote network management, wireless security, total cost of ownership, configuration management
    
By: NEC     Published Date: Jan 28, 2010

Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.

Tags : nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications, ip networks, ip telephony, network management, wireless infrastructure
    
By: NEC     Published Date: Dec 16, 2009

The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?

Tags : nec, business communication, productivity, unified communications, uc delivery, business continuity, mobile workers
    
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control, email security, hacker detection, mobile workers, smart phones, wireless security, data protection, desktop management, cloud computing, business technology, mobile device management
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: ThousandEyes     Published Date: Jan 14, 2018

ThousandEyes highlights the impact of an ongoing DDoS attack, provides visibility into the effectiveness of the mitigation and provides insight into the strategies of DDoS mitigation vendors.

Tags : thousandeyes, ddos, migration, network migration, network security, wireless security, data protection, secure content management
    
By: ThousandEyes     Published Date: Jan 14, 2018

Learn how the integrated solution lets you repurpose existing infrastructure to build an intelligent and cloud-aware WAN.

Tags : thousandeyes, wide area networks, wan, network intelligence, integration, network performance management, wlan, application integration, data integration, web service management
    
By: Informatica     Published Date: Aug 21, 2017

Download this white paper today to understand How patients are stepping up and using data to disrupt the traditional doctor-patient relationships.

Tags : informatica, data management, cloud data management, collaboration, analytics, digital healthcare, mobile data systems, data protection, document management, information management, records management, pci compliance, business technology
    
By: SAP     Published Date: Jul 28, 2017

This EIU report, sponsored by SAP, explores both the challenges and the opportunities facing IT in an era of digital transformation.

Tags : sap, digital transformation, digitising, digital services, mobile computing, database development, information management, productivity, business technology, technology, content management systems, online video marketing
    
By: Raritan     Published Date: Jul 10, 2017

Remote computing is no longer about just sticking a server and a router in a supply closet. The New Digital Outpost requires an entirely new approach to provisioning that fulfills more demanding require- ments for performance, availability, and total cost of ownership for remote computing

Tags : raritan, remote computing, remote workers, mobile workers, iot, infrastructure, data center, network management, remote access, remote network management, mobile computing, mobile data systems, wireless infrastructure, data center design and management
    
By: Workday     Published Date: Jun 05, 2017

In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.

Tags : workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology, finance technology, mobile data systems, smart phones, workforce management, data protection, collaboration, payroll software, financial management, expense management, technology, finance, data loss prevention
    
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: Citrix     Published Date: Apr 10, 2017

Citrix can help you with the challenge of adopting a new approach to WAN technology.

Tags : citrix, wan, wan technology, mobility, cloud, cloud computing, mobile computing, virtualization
    
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
By: Kaspersky     Published Date: Feb 06, 2017

Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.

Tags : kaspersky, cyber crime, data loss, business security, network security, email security, hacker detection, internet security, security policies, wireless security, best practices, data protection, email archiving
    
By: Blackboard     Published Date: Jan 24, 2017

Blackboard Collaborate is a modern solution for online collaborative learning.

Tags : blackboard, tech learning, learning, collaborative learning, tech for education, real-time interactive, virtual learning, mobile computing, smart phones, wireless messaging, elearning
    
By: Blackboard     Published Date: Jan 24, 2017

This video reveals the 7 great ways universities are using learning technology and pushing themselves up the rankings.

Tags : learning technology, tech for education, education, mobile apps, analytics tools, digital learning, mobile computing, smart phones, wireless communications, wireless messaging, elearning
    
By: Blackboard     Published Date: Jan 24, 2017

This infographic explores the 7 things students look for in a university and how tech can help.

Tags : learning technology, tech for education, education, digital learning, tech, smart phones, wireless communications, elearning
    
By: Blackboard     Published Date: Jan 24, 2017

Education is on a journey. Using new technology to transform the way you teach and learn.

Tags : education, education success, education tech, tech for education, must have tech for education, wireless network, apps, analytics, smart phones, wireless communications, wireless infrastructure, elearning
    
By: Oracle     Published Date: Jan 09, 2017

Basierend auf den Erkenntnissen unserer unabhängigen Forschungsstudie, Millennials und Hospitality: Die neue Definition von Service, erhalten Sie fünf Tipps, wie Sie erfolgreich das Geschäft dieser begehrten und technisch versierte Generation gewinnen und langfristig halten können.

Tags : mobility, mobile devices, millennials, hospitality, hotels, hotel management, mobile computing, mobile data systems, smart phones, virtualization, cloud computing, infrastructure
    
By: Oracle     Published Date: Jan 09, 2017

Sur la base des résultats de notre étude de recherche indépendante, La génération Y et l’hôtellerie-restauration - La redéfinition du service, obtenez nos cinq conseils pour vous aider à séduire les technophiles de la génération Y.

Tags : mobility, mobile devices, millennials, hospitality, hotels, hotel management, mobile computing, mobile data systems, smart phones, virtualization, cloud computing, infrastructure
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.