ComputerWeekly.com Research Library

Powered by Bitpipe.com

Wireless Networking Research

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Making Sense of the Wireless World - BlackBerry for Wireless LAN

    Sponsored by: BlackBerry

    This white paper reviews past and present technologies including a discussion of circuits and packets and also compares WLAN and WWAN networks in terms of advantages, challenges, and issues to consider when considering a wireless solution.

  • Motorola Installs a Wireless LAN to Improve Communications at Kilkenny Castle

    Sponsored by: Motorola, Inc.

    How did the historic Kilkenny Castle go from being a completely un-networked site where only a few staff had Internet access to a completely networked site with 90% coverage around the castle? You'll have to read this to find out.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data.

  • The CIO's Guide to Fixed Mobile Convergence

    Sponsored by: BlackBerry

    Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.

  • Distributed Workforce Management in the Cloud: Spreading IT Security Wherever Employees Roam

    Sponsored by: MessageLabs Symantec Hosted Solutions

    Todays wireless work environment poses new challenges for IT departments who must monitor and secure the online interactions of highly distributed and roaming workers. Companies are calling on security experts who can help organizations more effectively manage and protect their distributed workforce via the cloud.

  • Exchange Insider E-zine - Volume 3: Real-world Exchange 2007 Server Migrations

    Sponsored by: SearchWindowsServer.com

    In this issue of Exchange Insider e-zine, get an in-depth look at some real-world Exchange 2007 migration projects, what can go wrong and how to make the most of Exchange 2007's capabilities. This issue also highlights some must-have tools for securing mobile environments in Exchange as well as tips on keeping your servers running in peak condition

  • YellowPages.ca Goes Mobile While Sales Force Gets a Boost with BlackBerry Smartphones

    Sponsored by: BlackBerry

    Access this case study to learn how YPG created a consumer mobile version of YellowPages.ca™ and sales applications for BlackBerry® smartphones to expand the reach of its local search database.

  • IP Telephony from A-Z -- The Complete IP Telephony eBook

    Sponsored by: ShoreTel - OLD

    Check out this comprehensive eBook to discover the ins and outs of IP telephony system selection, deployment, and management.

  • Presentation Transcript: Strategic Steps for Moving to LTE

    Sponsored by: Alcatel-Lucent

    The growing success of mobile data services and of end user devices, such as the iPhone, are causing performance bottlenecks into our next generation mobile networks. This presentation transcript takes a look at how LTE, the next generation of wireless network, is dealing with these challenges while taking the user experience to the next level.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.