ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Computing Research

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • Top 8 Considerations to Enable - and Simplify - Mobility

    Sponsored by: TechTarget Security

    Embracing mobility doesn't need to be complicated or costly. Gain expert advice on the top 8 considerations for simply, but effectively enabling mobility in both the enterprise and the IT department.

  • WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions

    Sponsored by: TechTarget Security

    Read this e-guide from our experts at SearchNetworking.com to gain a better understanding of WLAN solutions and how to evaluate them. Inside you'll find critical questions you should ask when exploring solutions as well as a discussion about the myths surrounding cloud-managed WLANs.

  • Myth vs. Reality: Cloud-Managed Wireless LAN and the Primary Access Network

    Sponsored by: TechTarget Security

    This expert E-Guide debunks common misconceptions associated with cloud-managed wireless LAN (WLAN) offerings. Separate fact from fiction and discover the opportunity of next-generation WLAN by reading on now.

  • WLAN Access Control and Wi-Fi Network Needs

    Sponsored by: TechTarget Security

    This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.

  • Trends Reshaping Wireless Networking

    Sponsored by: TechTarget Networking

    This in-depth resource investigates the trends that are reshaping wireless networking to help you plan for today's mobility and connectivity needs.

  • Computer Weekly: The Rise of Home Automation

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in smart home technology and the opportunities it presents for businesses. Our new buyer's guide examines the options for setting up an enterprise app store. And we find out how in-store tracking technology could improve the retail experience for shoppers. Read the issue now.

  • The Virtue of Virtual Infrastructure

    Sponsored by: TechTarget Health IT

    Read how healthcare organizations have benefited from implementing virtual desktop infrastructure (VDI) environments, so far enjoying improved efficiency while maintaining HIPAA compliance.

  • HetNets: Small Cells, Big Challenge

    Sponsored by: Ixia

    In this brief webcast, learn why mobile operators are turning to Heterogeneous Networks (HetNets) to close the gap between cost and network capacity. With no end to mobile growth in sight, watch now to discover why HetNets may be the best choice for wireless.

  • Alcatel-Lucent Enterprise Wireless LAN (WLAN) What to expect from 802.11ac

    Sponsored by: Alcatel-Lucent Enterprise

    In this exclusive white paper, explore 802.11ac, and how this evolved Wi-Fi standard has extended coverage beyond physical boundaries in the office, and offers more reliable connections no matter how many clients are trying to access the network.

  • Creating a Mobile-Centric Organization

    Sponsored by: Hewlett Packard Enterprise

    Discover an innovative approach to designing and deploying networks that can help you support a mobile workforce while lowering costs and cutting complexity.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • Case Study: How Liverpool FC and Alexandra Palace successfully rolled out Wi-Fi

    Sponsored by: Xirrus

    This expert e-guide examines two recent wireless case studies. Inside, learn how Liverpool FC and Alexandra Palace each navigated the challenges of Wi-Fi deployment and reaped the rewards of wireless.

  • Simplify Network Management with New Secure and Scable Wireless Solutions

    Sponsored by: DellEMC and Intel®

    Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.

  • Backing up Buckeyes: Enterprise endpoint backup in an evolving-BYOD, customer-centric IT culture

    Sponsored by: Code42

    This exclusive case study examines how a major American university utilized an endpoint backup solution in combination with a private cloud strategy to streamline backup management, support all mobile platforms and lower overall costs.

  • Wireless Solutions for High Density Wireless

    Sponsored by: Xirrus

    This brief resource outlines a smarter solution for high-density wireless networking that can scale to support thousands of simultaneous users and an ever-increasing range of wireless devices. Read on now to learn about the capabilities that make this solution a perfect fit for high-density environments.

  • Wireless Solutions for Tablets and Smartphones

    Sponsored by: Xirrus

    As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.

  • Application Control at the Wireless Edge

    Sponsored by: Xirrus

    With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.

  • Building High Performance Networks with 802.11ac

    Sponsored by: Xirrus

    This resource takes an inside look at the 802.11ac wireless networking standard, and offers tips and tactics to help you approach wired-equivalent performance per user.

  • Five Steps to Successfully Migrate to 802.11ac

    Sponsored by: Aruba Networks

    802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.

  • E-Zine: Wired and wireless: Can you achieve an integrated network

    Sponsored by: TechTarget Networking

    This expert E-Zine will help IT professionals learn more about the challenges of networking and some best practices for managing wired and wireless technologies. Read on to learn more about unified architecture, unified wireless management, combining wired and wireless security, and more.

  • Tutorial: Five Steps to Effective Wireless Networking in Healthcare

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.

  • Maintaining Wireless Network Availability in Hospitals

    Sponsored by: HP & Intel®

    This e-book from SearchHealthIT.com takes an in-depth look at the primary concerns and drivers behind wireless network connectivity in health care. Inside, uncover an overview of 3 primary wireless technologies to gain a better understanding of how to provide wireless access to hospital staff.

  • Workshifting: A global market research report

    Sponsored by: Citrix

    This market research report provides insight into the key drivers behind the trends of workshifting, IT consumerisation and Bring Your Own Device (BYOD). Discover how businesses are gaining tangible benefits from a more mobile and flexible workforce.

  • Protect Sensitive Data on Laptops - Even for Disconnected Users

    Sponsored by: Citrix Systems, Inc.

    Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.