Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 1479Sort Results By: Published Date | Title | Company Name
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.

Tags : mobile device management, education, educators, students, app management, smartphone, tablet, classroom
    
By: IBM     Published Date: Jul 09, 2015

This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.

Tags : application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications
    
By: IBM     Published Date: Jul 07, 2015

This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.

Tags : ibm, developer, app, platform, it manager, ciso, integration, support
    
By: IBM     Published Date: Jul 07, 2015

By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?

Tags : ibm, mobile, devices, strategy, infrastructure, wireless
    
By: IBM     Published Date: Jul 07, 2015

Mobile Devices in the workplace will exceed 5.25 Billion. Are you Ready?

Tags : ibm, mobile, devices, strategy, infrastructure, mobile computing, mobile data systems, mobile workers
    
By: IBM     Published Date: Jul 07, 2015

Attend this 30-minute webcast to learn more about enterprise mobility platforms in order to make a more informed decision when choosing solution for you organization.

Tags : mobile application, app development, enterprise mobility, mobile developement, mobile computing, mobile data systems, wireless communications, wireless hardware
    
By: IBM     Published Date: Jul 07, 2015

Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.”

Tags : bad application, forrester consulting, engaged users, webinar, mobile app, mobilefirst, app development, mobile data systems
    
By: CDW     Published Date: Jun 30, 2015

Total Mobility Management (TMM) is a comprehensive platform that makes implementing, managing, and securing mobile devices simple.

Tags : mobility, apps, strategy, platform, tmm, risk management, productivity, mobile computing
    
By: CDW     Published Date: Jun 30, 2015

Apps have made mobile devices standard equipment for today’s workforce. And with the right strategy for selecting and customizing them, apps can change the way you work.

Tags : mobility, mobile workers, byod, productivity, mobile data systems, smart phones, application integration, application performance management
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Seagate Technology     Published Date: May 15, 2015

An inside look at how IT Executives and System Integrators are managing video surveillance data.

Tags : system integrators, enterprise it, video surveillance, knowledge management, ip networks, biometrics, intrusion detection, mobile data systems
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the importance of evaluating EFSS solutions through the lens of balancing usability and control.

Tags : usability, fss, enterprise, efss solutions, fss usage, employee adaption, mobile computing, application integration
    
By: Dropbox for Business     Published Date: May 07, 2015

An IDC analysis of organizations adopting Dropbox for Business shows high end-user satisfaction and a strong return on investment (ROI) impacting both end-user productivity and IT infrastructure savings.

Tags : roi, dropbox for business, dfb, employee productivity, infrastructure management, enterprise, cloud adoption, mobile adoption
    
By: Dropbox for Business     Published Date: May 07, 2015

Discusses the challenges organizations face when evaluating Enterprise File Sync and Share solutions

Tags : efss, accessibility, cloud storage, content management, mobility, virtualization, storage management, storage virtualization
    
By: Dropbox for Business     Published Date: May 07, 2015

It's all about Usability. Help educate your prospects about the shifting role of IT and share best practices for evaluating technology in a BYOD world.

Tags : usability, employee performance, consumerization, application adoption, best practices, byod, data management, ofs
    
By: Dropbox for Business     Published Date: May 07, 2015

Over the past year, Dropbox has released several sets of improvements to its Dropbox for Business product aimed at small business and team use.

Tags : enterprise, collaboration strategies, content management, content strategies, usability, enterprise applications, storage management, mobile computing
    
By: CDW     Published Date: Mar 27, 2015

Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time, anywhere. These benefits often include increased profits, a more efficient and productive workforce, and enhanced customer service.

Tags : mobile, productive, workforce, deployment, customer service, benefit, success, data
    
By: CDW     Published Date: Mar 27, 2015

Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.

Tags : mobile, security, strategy, application, enterprise, network, data, wireless
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.