> Technology > Wireless
 

Wireless

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.
Results 376 - 400 of 616Sort Results By: Published Date | Title | Company Name
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : 
malware, security, cyber thieves, malware trends, security systems
    
Webroot Inc
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint
    
Webroot Inc
White Paper Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing
    
Nativeflow
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Firewall and IPS Deployment Guide
Tags : 
cisco, firewall, security, ips deployment guide, ips
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.
Tags : 
cisco, byod, wireless, bring your own device, cisco validated design
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
Latest IT Trends For Secure Mobile Collaboration
Tags : 
cisco, byod, bring your own device, mobile, mobile collaboration
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 16, 2014
A Model of BYOD’s Benefits to Global Companies
Tags : 
cisco, byod, global companies, cisco ibsg, bring your own device.
    
Cisco
White Paper Published By: Avaya     Published Date: Jan 15, 2014
Communication solutions are reaching an ideal balance of sophistication and ease-of-use. But are you making the most of these technologies by integrating them into your daily workflows to make innovation and collaboration part of every interaction?
Tags : 
avaya, collaboration, integration, integrating technology, workflow
    
Avaya
White Paper Published By: Cisco     Published Date: Jan 14, 2014
Leadership and technology: Mobility and bring-your-own device insights for midmarket enterprises Sponsored by Cisco Systems, Inc -- July 2013.
Tags : 
cisco, byod, mobility, bring-your-own device, unified communications
    
Cisco
White Paper Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration
    
SafeNet
White Paper Published By: SafeNet     Published Date: Jan 14, 2014
SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration
    
SafeNet
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security
    
CA Technologies
White Paper Published By: Cisco Systems     Published Date: Dec 23, 2013
Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now
Tags : 
cisco, lippis, centric networking, cloud computing, network engineers
    
Cisco Systems
White Paper Published By: Cisco Systems     Published Date: Dec 23, 2013
Are you ready to leverage the flexibility and power of mobile and cloud computing? ZK Research outlines the limitations of legacy WANs and provides recommendations for transforming your network into a strategic asset. See why the Cisco ISR 4451-AX is your building block for evolving the WAN. Read Now
Tags : 
cisco, zk research, wan, virtualization, data center
    
Cisco Systems
White Paper Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds
    
Cisco Systems
White Paper Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks
    
Webroot UK
White Paper Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture
    
Collaborative Consulting
White Paper Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : 
collaborative consulting, creating opportunities, driving disruption, social, mobile
    
Collaborative Consulting
White Paper Published By: Avaya     Published Date: Dec 18, 2013
By now, we’re all aware of what a powerful force social media can be for a business — be it positive or negative. But how should your business address what’s happening in social media? Avaya believes you should do it in same way you take on other customer concerns — with your contact center.
Tags : 
avaya, social media, contact center, customer service, customer concern
    
Avaya
White Paper Published By: Avaya     Published Date: Dec 18, 2013
Discover the four biggest challenges created by the rise of the mobile workforce – and how your organization can achieve a unified solution.
Tags : 
avaya, mobility, mobile workforce, unified solution, it management
    
Avaya
White Paper Published By: Avaya     Published Date: Dec 18, 2013
The new mobile mantra for business: Cost-effectively boost productivity and the bottom line with secure access to enterprise grade telephony and collaboration.
Tags : 
avaya, mobile, mobility, customer service, remote workforce
    
Avaya
White Paper Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management
    
Bitium
White Paper Published By: VMware, Inc     Published Date: Dec 05, 2013
This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well as strategies for how to get started building a secure cloud initiative. Please download the white paper for more information.
Tags : 
vmware, global cloud computing adoption, security and compliance, virtualized datacenter, securing cloud environments
    
VMware, Inc
White Paper Published By: Socrata, Inc     Published Date: Dec 02, 2013
Get Step-By-Step Guidance for Government Open Data Success from Socrata, the Global Open Data Leader.
Tags : 
open data, open data platform, open data portal, open data policy, open data program
    
Socrata, Inc
White Paper Published By: Socrata, Inc     Published Date: Dec 02, 2013
Build a World-Class Stat Program with Tips from Socrata, the Global Leader in Public Sector Performance Management.
Tags : 
open data, open data platform, open data portal, open data policy, open data program
    
Socrata, Inc
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com