ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wi-Fi Research

  • Security in the Face of Disaster

    Sponsored by: Motorola Solutions

    Read this white paper to learn how a New Orleans-based systems integrator relied on Motorola's Canopy® wireless broadband platform to bring better communications and security to New Orleans.

  • Integrating Mobile Access into Your VPN Environment

    Sponsored by: AT&T Corp

    Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.

  • 5-Step Plan for Securing Your Enterprise WLAN

    Sponsored by: AirTight Networks, Inc.

    Read this white paper that details the five essential steps you must take to secure your enterprise WLAN.

  • Is It the Network? Solving VoIP Problems on a Wireless LAN

    Sponsored by: Global Knowledge

    The goal of this paper is to combine a deep knowledge of 802.11 protocols, quality of service (QoS) mechanisms and VoIP handsets with the feedback from IT professionals to identify potential problems and solutions when rolling out VoIP on a Wi-...

  • Troubleshooting Wireless LANs to Improve Wi-Fi Uptime and Security

    Sponsored by: Fluke Networks

    This whitepaper gives you an in-depth look at the wireless troubleshooting process. You'll learn how to improve security and performance by identifying rogue access points and ad-hoc networks and learn how to conduct network audits.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.