ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless NetworkingResearch

  • Case study: How the NEC gained high-density Wi-Fi coverage

    Sponsored by: Xirrus

    This video case study explores how the right Wi-Fi solution has allowed the National Exhibition Centre (NEC) – an event and conference venue with 2.1 million annual visitors – to provide wireless connectivity to thousands of concurrent heavy-bandwidth users.

  • Expert tips for securing mobile devices in the enterprise

    Sponsored by: SearchSecurity.com

    This expert e-guide explores the ins and outs of developing a comprehensive mobile device management strategy to enable secure Bring Your Own Device (BYOD). Find out how to plug key security vulernabilities, support devices and craft new policies.

  • E-Zine: Wired and wireless: Can you achieve an integrated network

    Sponsored by: SearchNetworking.com

    This expert E-Zine will help IT professionals learn more about the challenges of networking and some best practices for managing wired and wireless technologies. Read on to learn more about unified architecture, unified wireless management, combining wired and wireless security, and more.

  • HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm

    Sponsored by: BlackBerry

    Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Mobile Integration, Simplified: Part 4 - Building Industrial-Strength Mobile Apps

    Sponsored by: Teamstudio, Inc.

    User demand has forced IT to re-evaluate company policies and embrace mobile computing. Access this exclusive resource to explore how companies are now taking mobile computing to the next level with customized mobile applications designed to enhance productivity in the workplace.

  • Maximizing Smartphone Value: A Guide for IT Admins

    Sponsored by: BlackBerry

    As an IT administrator what steps can you take to help your organization benefit the most from the mobile revolution? This guide offers practical, fresh ideas to help you lower costs, maximize benefits and map a strategy.

  • Mobile Remote access services from ATT Video

    Sponsored by: AT&T Corp

    Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.

  • End User Experience Unplugged

    Sponsored by: Aternity

    Discover how a breakthrough end user experience (EUE) management tool can help you unlock performance management for all platforms and application types to ensure the optimal user experience regardless of device or location.

  • Can Your Security Keep Up with 70,000 New Malware Strains a Day?

    Sponsored by: CenturyLink Technology Solutions

    This timely white paper takes a look at some of the year's top security trends as well as sound advice for managing the risk associated with the emerging threats brought about by the proliferation of consumer mobile devices within the enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.