Wireless Infrastructure White Papers

Wireless Infrastructure is an 802.11 networking framework in which devices communicate with each other by first going through an Access Point (AP). In infrastructure mode, wireless devices can communicate with each other or can communicate with a wired network.
Results 1 - 25 of 222Sort Results By: Published Date | Title | Company Name
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses critical best practices including approaches for both policy and technology.

Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
By: Limelight Networks     Published Date: Jul 01, 2011

Create your own tablet-worthy site, and make your marketing work harder. This report shows you how to: . Take advantage of the tablet as a high-end media experience . Create experiences that support unique tablet behavior . Increase engagement by leveraging user-generated content

Tags : mobile marketing, tablet-worthy site, mobile website, ipad site, limelight networks, content delivery, content delivery network, cdn
    
By: iPass     Published Date: Aug 28, 2008

Read this whitepaper now to learn all about 4G. New technologies, benefits and features of 4G will all be discussed in this white paper. Read now if you are considering future 4G deployment and find out how iPass can help!

Tags : ipass, mobile, broadband, wimax, iptv, fourth-generation, ip-based architecture, ofdma
    
By: Dell     Published Date: Mar 02, 2012

By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.

Tags : dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business
    
By: Salesforce.com     Published Date: Jun 10, 2013

Download your free copy and start turning your ideas into mobile apps. Get your free eBook and learn how to: Embrace mobile design principles Create engaging apps that put customers first Make every developer a mobile one Get on the fastest path to mobile freedom

Tags : engaging applications, cloud mobile development, application, mobile application development, apps, mobile applications, mobile design, mobile computing
    
By: ClickSoftware     Published Date: Sep 12, 2014

This eBook will let you in on the secrets of the industry best practices for mobile appointment booking.

Tags : mobile appointment bookings, booking solutions, mobile data systems, mobile workers, wireless application software, wireless communications, wireless infrastructure
    
By: HP Data Center     Published Date: Apr 16, 2009

This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.

Tags : hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless
    
By: Entrust     Published Date: Aug 03, 2011

Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.

Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
    
By: BMC Software     Published Date: Jan 31, 2014

Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.

Tags : bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.

Tags : mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention, access control
    
By: BlackBerry     Published Date: Jun 22, 2010

Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.

Tags : blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management
    
By: ForeScout     Published Date: Aug 14, 2012

In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.

Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod
    
By: HP - Enterprise     Published Date: Jun 04, 2013

Did you know that over 64% of mobile phone time is spent on applications? Mobile apps represent a huge opportunity for your enterprise to grow your business, but in order to benefit from them you need effective methods for developing, testing, and supporting mobile apps. Take a look at this eye-opening infographic to learn more about the current state of enterprise mobility and get the information you need to equip your business for mobile app development success.

Tags : mobile phone, white paper, enterprise, growing your business, applications, mobile applications, mobile data systems, smart phones
    
By: Intermec     Published Date: Sep 07, 2011

In this white paper, learn why emerging enterprise applications require ruggedness and reliability.

Tags : intermec, smart phones, reliability, handheld devices, ip ratings, drop ratings, mobile data systems, pda
    
By: Intermec     Published Date: Jun 20, 2013

Millions of new smart phones continue to ship every month, and many of them find their way into businesses to help workers do their jobs in innovative new ways. However, many of these same phones will be replaced within a year because they are not durable enough to work reliably in new enterprise work environments. In this white paper, learn why emerging enterprise applications require ruggedness and reliability.

Tags : smart phones, durability, enterprise applications, ruggedness, reliability, mobile workers, wireless hardware, wireless infrastructure
    
By: Aventail     Published Date: Aug 21, 2009

Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.

Tags : secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi
    
By: SAP     Published Date: Dec 20, 2010

This article will discuss how SAP is working to enable mobility for its customers and provide an overview of several of SAP's key mobility tools and applications.

Tags : sap, mobility, competitive edge, mobile workers, sybase, enterprise mobility, mobile, applications
    
By: Citrix     Published Date: Jul 25, 2014

Discover how to select technologies and develop policies for your BYOD program.

Tags : boyd, simple, secure, technologies, wireless infrastructure, wireless security, best practices, collaboration
    
By: Sybase     Published Date: Aug 21, 2009

The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.

Tags : mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile
    
By: Cotendo     Published Date: Nov 18, 2011

Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.

Tags : mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance, mobile cdn, mobile cloud, mobile application performance
    
By: BlackBerry     Published Date: Apr 13, 2010

The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.

Tags : blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim
    
By: BlackBerry     Published Date: Apr 13, 2010

The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.

Tags : blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
By: BlackBerry     Published Date: Apr 13, 2010

The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.

Tags : blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim
    
By: BlackBerry     Published Date: Mar 16, 2009

This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.

Tags : blackberry, enterprise solution, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software
    
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.