ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Networking Research

  • Addressing Mobile Threats: Effective Detection and Response

    Sponsored by: ArcSight, an HP Company

    Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.

  • FREE Wi-Fi Planning Tool: HiveManager Online Planner

    Sponsored by: Aerohive Networks

    Plan a Wi-Fi deployment using Aerohive’s FREE web-based planning tool!

  • Goodman's LLP Case Study: Law Firm Plans for Contingencies with Indispensible BlackBerry Smartphones

    Sponsored by: BlackBerry

    Access this case study to learn how a company deployed WIC Messenger to automatically push an up-to-date list of PINs to each BlackBerry smartphone so users could easily contact each other in the event of a power outage or email service disruption.

  • Next-Generation WAN Optimization Is Happening Now

    Sponsored by: BlueCoat

    Discover what Forrester Consulting is saying about next generation WAN optimization in this technology adoption profile commissioned by Blue Coat.

  • Mobility and Tablet Trends in Healthcare IT

    Sponsored by: Intel

    Caregivers want the devices they work with to function like the devices in their pockets. And this is steadily becoming a reality. View today’s brief video and join Motion Computing’s Vice President of Marketing, Mike Stinson as he talks about the latest health IT trends in tablets and other mobile devices.

  • EcoPaper Customer Success Story

    Sponsored by: BlackBerry

    Access this case study to learn how Ecopaper equipped its sales force with BlackBerry® smartphones and deployed a mobile application called PWAP, from BlackBerry® Associate Alliance Member True Systems, to automate the sales process.

  • Considerations for Mobilizing Your Lotus Notes Applications

    Sponsored by: Teamstudio, Inc.

    In this paper, we’ve reviewed several viable options for mobilizing your Lotus Notes applications, and only you and your team can decide what will work best for your organization. One thing, however, is clear. When you give it some thought, you’ll find that mobilizing carefully selected applications and functions makes good business sense.

  • CIO Survival Guide: The Convergence of Collaboration, Cloud, and Clients

    Sponsored by: Cisco Systems, Inc.

    Today’s workers demand mobile devices, SaaS and online collaboration tools in order to be more productive. Given that these new consumer-inspired technologies cannot be divorced from the current IT infrastructure, CIOs face difficult questions. Read this paper to learn how CIOs can ensure that they are orchestrating a harmonic convergence.

  • Business Intelligence Strategies for 4G Operators

    Sponsored by: Sybase, an SAP company

    This paper explores the opportunities and challenges presented by the introduction of services on 4G networks, and examines how a strategic BI implementation can help to transform the services a company provides while managing costs of providing them. It also considers the variety of practical applications of a BI system.

  • Mobile Security Report 2009

    Sponsored by: Intel Security

    Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.