Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 997Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Aug 28, 2014

This webinar focuses on helping you make the move to the cloud apps.

Tags : webinar on the cloud, cloud apps, moving to cloud apps, customisation of the cloud, mobile computing, mobile data systems, application integration, application performance management
    
By: Workday     Published Date: Aug 27, 2014

This whitepaper will help you learn how Workday can help free IT from the burden of maintaining legacy ERP.

Tags : customising erp, configuration, customisation, cloud applications, workday, mobile computing, wireless application software, wireless infrastructure
    
By: Workday     Published Date: Aug 27, 2014

This paper provides the findings of the IDG survey of 100 IT executives working in organisations with 1000+ employees and shows its important findings.

Tags : idg survey, the move to the cloud, it trends, european movement to the cloud, hcm system, mobile computing, wireless application software, cloud computing
    
By: Workday     Published Date: Aug 27, 2014

This paper describes—in three steps—the approach Workday is taking to create the next generation of enterprise business solutions "from the ground up."

Tags : innovation, enterprise business solutions, workday, saas, platforms, storage, data management, mobile computing
    
By: Workday     Published Date: Aug 27, 2014

Read the whitepaper, A New Model for User Engagement, to discover how Workday is redefining the way work gets done in our new business world with game-changing cloud-based innovations.

Tags : user engagement, changing work styles, workforce platforms, collaboration, enterprise applications, mobile computing, mobile data systems, mobile workers
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Workday     Published Date: Aug 27, 2014

The trend towards SaaS in organisations of all sizes is now irreversible, a survey says.

Tags : saas, service based software, trend towards the cloud, cloud applications, knowledge management, enterprise applications, storage, mobile computing
    
By: Workday     Published Date: Aug 26, 2014

In this whitepaper, two cloud application pioneers discuss the 10 critical requirements of cloud application.

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, application integration, virtualization
    
By: Aerohive Networks     Published Date: Aug 22, 2014

Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase. It will highlight top 10 features for a WLAN, help you decide on architectural choices and summarize how to use the RFP process to select a vendor.

Tags : wlan, wi-fi, network, rfp, process, vendor, requirements, networking
    
By: Global Knowledge     Published Date: Aug 19, 2014

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.

Tags : subnetting, broadcast domains, network design process, ip networks, ip telephony, wireless infrastructure
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, productivity, cloud computing
    
By: Box     Published Date: Aug 13, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, enterprise applications, web service security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

EFSS offerings from 19 vendors are reviewed and compared in this Magic Quadrant.

Tags : box, file sharing, file synchronisation, mobile collaboration, efss capabilities, magic quadrant, storage virtualization, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.