sans fil

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document explique comment éliminer la complexité et les coûts des réseaux sans fil traditionnels et créer un réseau prêt pour la mobilité.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks, mobility network
    
Aerohive
Published By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: Extreme Networks     Published Date: Feb 10, 2015
Découvrez en 10 points clés comment la remontée d’informations stratégiques sur les applications, les utilisateurs, les appareils utilisés sur le réseau et leur localisation, peut vous aider à prendre de meilleures décisions, plus rapidement.
Tags : 
extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview, santé, networking
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 10, 2015
Téléchargez le livre blanc pour découvrir comment planifier votre migration vers le 802.11ac
Tags : 
extreme networks, wifi, byod, 802.11ac, wi-fi, infrastructure wifi, réseau sans fil, réseau, mobilité, it management, wireless, business technology
    
Extreme Networks
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence, analyse applicative, datamining, réseau, optimisation du réseau, business analytics, application, sécurité des applications, wireless
    
Extreme Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage, wired network, traffic congestion, performance degradation, optimal performance, controller-based deployment, quadrature amplitude modulation, planning for capacity, mobile devices, complex deployments, client density, real-time location services, location accuracy
    
Aruba Networks
Published By: Extreme Networks     Published Date: Sep 26, 2014
Les établissements hospitaliers sont aujourd’hui soumis à des pressions financières et techniques pour améliorer le traitement du patient et augmenter leur productivité. Un réseau filaire et Wi-Fi hautement sécurité et fiable est le minima requis pour supporter les données, la voix, la vidéo et les équipements et les applications métiers. Mais comment garantir continuité de service et connectivité Wi-Fi pervasive pour supporter ces éléments clés au meilleur coût ? Ce livre blanc vous guide grâce aux témoignages de professionnels de l’IT au sein de grands établissements hospitaliers. Ils y expliquent comment ils ont relevé le challenge de la mobilité en garantissant la sécurité de leurs patients.
Tags : 
extreme networks, wifi, byod, réseau sans fil, réseau hôpitaux, mobilité, réseau, purview, santé, networking
    
Extreme Networks
Published By: IBM     Published Date: Jul 15, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
best practices, security, technology, next gen
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, networking, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report, network security, enterprise applications, business technology
    
IBM
Published By: Onaro     Published Date: May 09, 2007
Endless capital requests for additional storage resources are the bane of existence for many storage directors and infrastructure VPs. This white paper proposes a more effective approach to solving the utilization challenge in complex SANs.
Tags : 
san, sans, srm, storage, storage management, storage infrastructure, sanscreen, file-level utilization, tiered storage, load balancing, storage area networks, onaro
    
Onaro
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com