Wireless White Papers

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.

Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN
Results 1 - 25 of 1097Sort Results By: Published Date | Title | Company Name
By: ClickSoftware     Published Date: Nov 17, 2014

From calculator watches to smart glasses, this paper will guide you through the evolution of wearable technology and its impact on the service industry. This whitepaper will help you to understand how your business can benefit by getting ahead of the trend through implementing wearable technology within your organisation.

Tags : shift scheduling, wearable technology, the evolution of wearable technology, byow, it management, mobile computing, mobile data systems, mobile workers
    
By: Citrix Systems     Published Date: Nov 10, 2014

Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.

Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
By: Citrix Systems     Published Date: Nov 10, 2014

Don't let poor performance and inadequate security constrain your enterprise mobility initiatives. Accelerate and protect your mobile workspaces with innovative NetScaler MobileStream technology from Citrix.

Tags : optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization
    
By: Citrix Systems     Published Date: Nov 10, 2014

"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."

Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
By: Citrix Systems     Published Date: Nov 10, 2014

Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.

Tags : optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization
    
By: Citrix Systems     Published Date: Nov 10, 2014

We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).

Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
By: Box     Published Date: Nov 09, 2014

Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, content sharing, mobile workers, collaboration, cloud file sharing, network architecture, remote access
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
By: Box     Published Date: Nov 09, 2014

Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs

Tags : box, content file sharing, collaboration, content sharing, mobile workforce, cloud computing, cloud storage, infrastructure
    
By: CA Technologies     Published Date: Nov 07, 2014

Les activités IT et métier sont concernées par de nombreuses tendances : l’adoption du Cloud, l’accroissement de la mobilité, l’essor des médias sociaux et l’augmentation des flux d’informations circulant au sein de toute l’entreprise. Le concept de périmètre réseau n’a plus de sens. En effet, l’IT doit aujourd’hui composer avec des identités hautement distribuées sur l’ensemble de l’environnement métier et provenant de nombreuses sources, telles que des applications, des systèmes, des médias sociaux, etc. Les employés et les clients mobiles sont, par ailleurs, en train de changer profondément l’activité et de redéfinir le défi consistant à fournir rapidement des applications sécurisées à une population d’utilisateurs en constante évolution. À chaque défi son opportunité. L’identité remplace désormais le périmètre réseau, et seules les entreprises qui ont compris cette évolution sont en mesure de dynamiser et de protéger leur activité.

Tags : business trends, cloud adoption, sociial media, social mobility, security in the cloud, business security, wireless, application security
    
By: CA Technologies     Published Date: Nov 07, 2014

Découvrez dans ce livre blanc une technologie unique de gestion des caractéristiques de sécurité, de performances, de conformité et de support de tout type de périphérique, d’application, de contenu ou de courriel, qui préserve la qualité de l’expérience utilisateur mobile.

Tags : mobile user experience, security features, security in the cloud, the mobile user experience, optimising the user experience, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Nov 07, 2014

Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.

Tags : enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers
    
By: CA Technologies     Published Date: Nov 07, 2014

Fournissez de nouveaux services métier sécurisés et améliorez l’expérience client. De plus en plus d’entreprises adoptent le Cloud, la technologie mobile et les réseaux sociaux pour élargir leurs activités, créer de nouveaux canaux commerciaux et améliorer les services aux clients.

Tags : accelerate service engagement, improve customer engagement, cloud, social networks, secure services, improve the customer experience, mobile computing, mobile data systems
    
By: CA Technologies     Published Date: Nov 07, 2014

Les supports mobiles, sociaux et de cloud computing ont aidé à éliminer les vieux périmètres réseau. La nouvelle entreprise ouverte doit faire avec un large éventail d'utilisateurs, d'appareils et d'applications, sans limites définies. De nouveaux modèles de sécurité sont essentiels pour à la fois permettre et protéger les activités commerciales dans ce monde nouveau. Téléchargez le guide.

Tags : mobile media, social media, mobile workers, security in the cloud, removal of the network perimeters, remote access, access control, application security
    
By: CA Technologies     Published Date: Nov 07, 2014

Une solution IAM hybride permet aux organisations de migrer vers le Cloud au rythme qui correspond à leurs exigences de réduction des coûts opérationnels et d’améliorer leur agilité.

Tags : ca technologies, migrer vers le cloud, cloud computing, iam hybride permet, identity management, mobile computing, infrastructure
    
By: Polycom     Published Date: Nov 06, 2014

This whitepaper explains the changing landscape of the video-enabled workplace and how this can benefit your business.

Tags : video enabled workplace, video conferencing in the workplace, mobile connectivity, collaboration in the workplace, mobile computing, mobile data systems, mobile workers, video conferencing
    
By: Polycom     Published Date: Nov 06, 2014

This white paper provides insight into the value of video conferencing in today’s business environment, and real-world examples of how organizations – large and small – are leveraging visual collaboration to find new clients, serve existing clients better, and improve their bottom line.

Tags : video conferencing, the benefits of video conferencing, video conferencing in the workplace, mobile computing
    
By: Polycom     Published Date: Nov 06, 2014

This document provides a top-level view of the survey data, along with some additional findings and observations.

Tags : benefits of viedo conferencing, polycom video conferencing, mobile computing, mobile workers, smart phones, video conferencing
    
By: Polycom     Published Date: Nov 06, 2014

This paper acts as a guide to the benefits of video-conferencing to help collaboration across borders.

Tags : cross border collaboration, video conferencing, the benefits of video conferencing, video conferencing in the workplace, mobile computing, mobile workers, smart phones
    
By: Polycom     Published Date: Nov 06, 2014

This report examines the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom RealPresence Platform to readers.

Tags : video conferencing, basics of video conferencing, deploying video conferencing, polycom, the benefits of video conferencing, smart phones
    
By: Adobe     Published Date: Nov 04, 2014

In this Gigaom Research Webinar, we will examine the schism between the automated enterprise and the manual operations that support it, assess the tools and processes available to bring the back office up to speed, and present a roadmap to bring business agility and consistency to your operations. We will discuss real-world examples and draw lessons that businesses of all sizes can use.

Tags : adobe, communications, business automation, business communications, operations, human resources, office compliance, wireless communications
    
By: Canopy     Published Date: Oct 29, 2014

A study into the drivers of cloud adoption among enterprises worldwide

Tags : cloud adoption, navigating the cloud market, cloud, mobile computing, mobile workers, cloud computing, design and facilities
    
By: Canopy     Published Date: Oct 29, 2014

In this essential guide, we’ll explore the perceived barriers to a dedicated Private Cloud. We’ll also show the opportunities for companies to reposition the role of IT within the business in a secure and dedicated cloud environment.

Tags : guide to the cloud, a guide to the private cloud, moving to the cloud, barriers to the cloud, benefits of moving to the cloud, how to move to the cloud, infrastructure, mobile computing
    
By: xMatters     Published Date: Oct 23, 2014

In many organizations, the IT team ushered in the first generation of primitive mobility, issuing pagers to on-call teams and guardians of key corporate systems. And while today, the vast majority of our pagers have been upgraded to smart phones and intelligent devices, many of them are used for little more than prompting us to log into a desktop system or dial a phone. This paper outlines six strategies for extending mobile devices beyond notification to workflows and robust productivity tools within your IT organization.

Tags : mobile, generation, mobility, on-call, team, corporate system, pagers, smart phones
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.