Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 989Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Aug 27, 2014

Join us for this Gigaom Research Webinar on Wednesday, August 27, 2014, at 10 a.m. PT; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.

Tags : forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
By: Aerohive Networks     Published Date: Aug 22, 2014

Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase. It will highlight top 10 features for a WLAN, help you decide on architectural choices and summarize how to use the RFP process to select a vendor.

Tags : wlan, wi-fi, network, rfp, process, vendor, requirements, networking
    
By: Global Knowledge     Published Date: Aug 19, 2014

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.

Tags : subnetting, broadcast domains, network design process, ip networks, ip telephony, wireless infrastructure
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app.

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, productivity, cloud computing
    
By: Box     Published Date: Aug 13, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, enterprise applications, web service security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

EFSS offerings from 19 vendors are reviewed and compared in this Magic Quadrant.

Tags : box, file sharing, file synchronisation, mobile collaboration, efss capabilities, magic quadrant, storage virtualization, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, enterprise applications, application security, identity management, internet security
    
By: Box     Published Date: Aug 13, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, identity management, network security appliance
    
By: Box     Published Date: Aug 13, 2014

This paper explains how growth, efficiency and expansion are the three main reasons to choose Box.

Tags : box, security, cloud services, cross team collaboration, enterprise content collaboration, application security, internet security, mobile computing
    
By: Box     Published Date: Aug 13, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Intel® Services     Published Date: Aug 11, 2014

In this guide, Intel® Services share lessons learned about deploying and managing successful enterprise APIs.

Tags : intel services, enterprises, api management, enterprise apis, wireless
    
By: KANA®, A Verint® Company     Published Date: Aug 07, 2014

In today’s digital age, where smartphones, tablets and other devices give people anytime, anywhere access to you and your brand, customer service has also gone digital. Social media, email, Web self-service, live chat and other tools give your customers a host of ways to contact you for help and to help themselves.

Tags : customer service, brand, digital, social media, smartphones, engagement, contact center, optimization
    
By: Adobe     Published Date: Aug 05, 2014

IT decision-makers can use this analysis to better understand the modern workers they’re supporting, with the objective of making them more productive and better aligned with corporate objectives.

Tags : adobe, adobe systems, byod, collaboration, modern workforce, workforce management, mobile devices, mobile workers
    
By: CA Technologies     Published Date: Aug 01, 2014

This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, smart phones, customer interaction service
    
By: CA Technologies     Published Date: Aug 01, 2014

This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, smart phones, customer interaction service
    
By: Bazaarvoice     Published Date: Jul 24, 2014

Join Bazaarvoice Client Success Directors as they share proven best practices from some of the world’s best brands including DELL, Bare Escentuals, Dillards, Urban Decay, BuyaGift, Microsoft and more.

Tags : bazaarvoice, holiday sales, holiday shopping, customers, christmas shopping, xmas, online shopping, retail
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.