Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 1154Sort Results By: Published Date | Title | Company Name
By: Hitachi Data Systems     Published Date: Feb 19, 2015

As companies mature in their use of public cloud environments, many realize they need to augment security availability services as well as formulate best practices in determining which data is appropriate for public cloud environments.

Tags : hitachi data systems, hds, cloud storage, cloud computing, cloud applications, storage virtualization, mobile data systems, application integration
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Cisco     Published Date: Jan 21, 2015

As the Internet of Everything (IoE) drives exponential change — and opportunity — customers and retailers face a complex maze of shopping journeys. Mobility and apps now represent a disruption similar in scope to what we saw with e-commerce in the late 1990s and early 2000s. In the second quarter of 2014, total discretionary retail spending rose 3 percent; e-commerce rose 10 percent; and mobile commerce rose 47 percent.

Tags : digital, shopping, journey, retail, mobility, apps, e-commerce, it management
    
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: Masergy     Published Date: Jan 20, 2015

This presentation will illustrate how IT leaders are leveraging Unified Communications (UC) to deliver real-world business impact and present a roadmap for moving from application- and device-specific infrastructures to a more flexible Unified Communications (UC) solution.

Tags : masergy, unified communications, ucaas, business communications, ip networks, ip telephony, network architecture, small business networks
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: IBM     Published Date: Jan 06, 2015

Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides.

Tags : social workplace, social technologies, mobile capabilities, social business tools, it management, wireless, knowledge management, enterprise applications
    
By: LogMeIn     Published Date: Jan 06, 2015

This White Paper provides information on how to avoid technology frustrations that sap productivity.

Tags : online meetings, business online meetings, how to improve online meetings, online conferences, network performance, quality of service, remote access, remote network management
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Cisco     Published Date: Jan 05, 2015

The introduction of personal and mobile endpoints is dramatically reshaping the landscape for group video collaboration. IT leaders should align their video portfolios for maximum utilization and strategic fit with their related investments in collaboration and unified communications.

Tags : mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
By: Cisco     Published Date: Jan 05, 2015

This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.

Tags : mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
By: Cisco     Published Date: Jan 05, 2015

In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.

Tags : mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
By: Cisco     Published Date: Jan 05, 2015

Many users have only scratched the surface of what’s possible with Cisco WebEx. Which means you may be missing out on options and opportunities that enhance collaboration, save time, and lead to great things. Give us an hour and we’ll show you how you can fully leverage your account to the benefit of your users, customers, partners, and you.

Tags : mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
By: Polycom     Published Date: Dec 18, 2014

It’s not just about reducing travel... The value that video adds goes far beyond the removal of the need to travel. Video isn’t just in a ‘conference room’ – it’s wherever people choose to work. Use video for your next meeting to overcome the expectation that ongoing help and support is required. Hold your next external meeting over video to give it that personal touch.

Tags : polycom, video technology, video benefits, wireless, knowledge management, enterprise applications, data management, it career advancement
    
By: Kaspersky     Published Date: Dec 09, 2014

Most established organizations have large IT departments with staff exclusively devoted to IT security. Education is a key component of this defensive strategy in today’s cybercriminal ecosystem. If you don’t know it’s there, you can’t defend against it.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, email security, identity management, network security, anti spyware
    
By: Tyco Integrated Security     Published Date: Dec 08, 2014

Start protecting your company with a small piece of technology that 85% of business owners tow around as their life force: your smartphone. Discover how making your business more secure can be as simple as it is vital.

Tags : remote security, business protection, security, mobile data systems, mobile workers
    
By: Box     Published Date: Jun 11, 2014

IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves.

Tags : box, idc, mobile, collaboration, enterprise, platform, wireless
    
By: Box     Published Date: Jun 11, 2014

A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Here’s how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, mobile, progressive, access, wireless
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Sonus Networks     Published Date: Apr 18, 2014

This guide is designed as an introduction to the Sonus SBC 5200 Session Border Controller.

Tags : sonus networks, sbc, sbs 5200, sip interoperability, wireless, enterprise applications
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.