ComputerWeekly.com Research Library

Powered by Bitpipe.com

Mobile ComputingResearch

  • Delivering gigabit wireless in the enterprise with 802.11ac

    Sponsored by: Dell, Inc.

    This informative white paper examines how your organization can significantly increase the speed of wireless connections, delivering gigabit wireless performance to bring your users' wireless experience closer to parity with wired connections.

  • WLAN Access Control and Wi-Fi Network Needs

    Sponsored by: SearchSecurity.com

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

  • The Virtue of Virtual Infrastructure

    Sponsored by: SearchHealthIT.com

    Read this handbook from searchHealthIT.com to see how some healthcare facilities have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance. Additionally, gain in-depth insight about the challenges to outsourcing healthcare IT operations.

  • Can Your Security Keep Up with 70,000 New Malware Strains a Day?

    Sponsored by: CenturyLink Technology Solutions

    This timely white paper takes a look at some of the year's top security trends as well as sound advice for managing the risk associated with the emerging threats brought about by the proliferation of consumer mobile devices within the enterprise.

  • Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam

    Sponsored by: MessageLabs Symantec Hosted Solutions

    Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.

  • Cisco: Leading the Way to Borderless Networks

    Sponsored by: Cisco Systems, Inc.

    Cisco's borderless networks promises to connect anyone to anywhere, using any device, to any resource—securely, reliably, transparently. In order to fully deliver on this promise, Cisco is advancing along three critical fronts: workplace transformation, technology leadership, and operational excellence. Read this paper to learn more.

  • The New Campus Network is Simply Connected

    Sponsored by: Juniper Networks, Inc.

    View this webcast and learn about Juniper’s recommendation for building a device and application agnostic network, which is simpler, higher performing and more secure, in an increasingly more mobile user setting.

  • The CIO's Guide to Wireless in the Enterprise

    Sponsored by: BlackBerry

    Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.

  • Five Steps to Successfully Migrate to 802.11ac

    Sponsored by: Aruba Networks

    802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.

  • Introducing BlackBerry Balance™ Technology

    Sponsored by: BlackBerry

    Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.