Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 1524Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 09, 2015

This webinar will focus on why analytics matters for all areas of your business, and provide a guide for how exactly to implement analytics in a way that lends itself to action and results.

Tags : ibm, business analytics, data analytics, telecommunications, telecom analytics, ip telephony, network management, mobile computing
    
By: Sage     Published Date: Aug 31, 2015

In this report, we will examine all facets of mobile payment processing, beginning with a very brief history of mobile payments and forecasts for the future. We will then explore the benefits of mobility for small and mid-sized businesses, the ease of processing mobile payments, the equipment required and the issues small and mid-sized businesses should take into consideration when taking your business mobile.

Tags : sage, mobile payments, business mobile, mobility, wireless, knowledge management, enterprise applications
    
By: TigerText     Published Date: Aug 30, 2015

Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.

Tags : tigertext, tiger text, byod, hippa compliance, patient data, secure data, records management, hacker detection
    
By: Silanis     Published Date: Aug 30, 2015

Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.

Tags : silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature
    
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
    
By: Google     Published Date: Aug 26, 2015

Con Google for Work nella prospettiva, desideriamo condividere questi otto principi di innovazione e mostrare come vengono applicati all'interno di Google.

Tags : google, culture of innovation, principles of innovation, google apps for work, google for work, enterprise applications, mobile computing, mobile data systems
    
By: Google     Published Date: Aug 26, 2015

La mobilità e il cloud oggi sono considerate le tecnologie più critiche per il luogo di lavoro. Trasformano inoltre il ruolo del CIO perché l'IT diventa un partner strategico per il business e passa da strumento per l'implementazione a motore.

Tags : workplace innovation, google for work, mobility, personal technology, security, moving to the cloud, mobile computing, virtualization
    
By: Google     Published Date: Aug 26, 2015

Noi di Google ci impegniamo a sostenere questa idea, e non siamo certamente i soli. Milioni di organizzazioni (imprese di piccole e grandi dimensioni, scuole ed enti governativi) hanno già iniziato ad adottare l'approccio "nel lavoro come nella vita".

Tags : work the way you live, mobile workers, smartphones, productive employees, engaging employees, remote access, mobile computing, mobile data systems
    
By: Google     Published Date: Aug 20, 2015

This white paper examines the role of IT in the new landscape, offering insights from IT and businesses that have leveraged Google Apps for Work to empower employees with collaboration tools they know and love while providing robust security and controls that protect data.

Tags : shadow it, tools for employees, keep your company safe, security risks, minimising risk, google apps for work, collaboration tools for employees, google apps for your team
    
By: Google     Published Date: Aug 20, 2015

Ce livre blanc étudie le rôle des services informatiques dans ce nouveau paysage. Il présente également l'expérience vécue par des équipes informatiques et entreprises qui sont passées à Google Apps for Work pour permettre à leurs collaborateurs d'utiliser les outils qu'ils connaissent et apprécient, tout en offrant un niveau de sécurité élevé et des dispositifs de protection des données.

Tags : shadow it, tools for employees, keep your company safe, security risks, minimising risk, google apps for work, collaboration tools for employees, google apps for your team
    
By: Workday     Published Date: Aug 17, 2015

The benefits of cloud computing -- high return on investment, greater staff efficiencies, optimisations of IT resources, and enhanced visibility and access to information -- are piquing the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model.

Tags : cloud, cloud computing, finance, cloud for finance, finance operations in the cloud, finance, roi, finance leaders
    
By: Workday     Published Date: Aug 17, 2015

Workday Financial Management is vanaf de grond opgebouwd voor de Cloud en voldoet aan de behoeften van de CFO van nu.

Tags : finance, modern financial management, financial management systems, financial management, workday solutions, workday financials, cfo, finance organisation
    
By: Box     Published Date: Aug 11, 2015

This white paper reveals how CIOs are deploying an array of mobile content security technologies, giving them a robust platform upon which to build as their mobile usage expands.

Tags : mobility, mobile security, security technology, mobile for work, mobile, byod, cyod, endpoint
    
By: HP AppPulse Mobile     Published Date: Aug 10, 2015

This is an ebook about HP AppPulse Mobile, a mobile monitoring software product that makes it easy to monitor your success.

Tags : mobile, software, product, success, wireless
    
By: Cloud Sherpas     Published Date: Aug 10, 2015

This white paper outlines exactly what the Google solution delivers and the top five reasons why more enterprises are choosing to move to the cloud with Google every day.

Tags : google enterprise solutions, google cloud applications, business cloud apps, google apps for business training, google app migration, migrating to google apps, cloud apps for business, google app development
    
By: Adobe     Published Date: Aug 04, 2015

This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.

Tags : mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
By: Adobe     Published Date: Aug 04, 2015

This report lays out the opportunities to use mobile messaging as well as how to use the IDEA cycle to identify the most important moments and tactics so you can use messaging to its full potential.

Tags : mobility, consumer mobility, engagement, customer engagement, customer, customer journey, marketing, messagung
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.

Tags : app management, app security, privacy, data passing, mobile app, networking, security, software development
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : mobile application lifecycle, application lifecycle management, security, malm, app protection, networking, software development, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.

Tags : enterprise mobility management, technology roadmap, mobile devices, networking, security, it management, wireless
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.

Tags : byod, mobile devices, smartphone, tablet, networking, it management, wireless
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.