ComputerWeekly.com Research Library

Powered by Bitpipe.com

ZigBee Research

  • 5G versus Wi-Fi 6: Deployment considerations for enterprises

    Sponsored by: Verizon

    Cellular and Wi-Fi technologies are undergoing major technological advances to support new bandwidth-hungry technologies that require high-speed, high-capacity and low-latency wireless connectivity. In this white paper, learn everything you need to know about 5G and Wi-Fi 6.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Border Gateway Protocol: The Roadmap to the Internet

    Sponsored by: AppNeta

    Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.

  • Connected Education: Preparing for the Digital Classroom

    Sponsored by: ALE USA

    In this white paper, learn how educational organizations can prepare for a WLAN infrastructure that can handle a large influx of mobile devices and bandwidth heavy applications.

  • Connecting Technologies that Protect First Responders and Communities

    Sponsored by: Cradlepoint

    In this video, learn how Cradlepoint can help provide the secure connectivity that first responders including police, fire, and EMS agencies need to leverage critical technologies and access up-to-date information 24x7.

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • E-Guide: Wireless LAN access control: Managing users and their devices

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.

  • Ensuring an Optimal Wi-Fi Experience: Best Practices

    Sponsored by: SearchSecurity.com

    This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.

  • 5 ways to improve WLAN reliability, performance and capacity

    Sponsored by: Hewlett Packard Enterprise

    Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.

  • A Guide to Effectively Managing Enterprise Wi-Fi Networks

    Sponsored by: Motorola, Inc.

    In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • An Introduction to Quantum Lifecycle Management

    Sponsored by: ComputerWeekly.com

    This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.

  • Bring Your Own Design: Simplifying BYOD with Ruckus Wireless

    Sponsored by: Ruckus Wireless

    Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.

  • Bring Your Own iPad to Work

    Sponsored by: Aruba Networks, Inc.

    Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.

  • Built-in Self-test (BIST) Using Boundary Scan

    Sponsored by: Texas Instruments, Inc.

    This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.

  • Business Continuity Management Systems

    Sponsored by: ComputerWeekly.com

    Brush-up you knowledge of the practical aspects of business continuity management with this book extract.

  • Cisco Intercompany Media Engine for Dummies Section 1: SIP Alone Doesn't Cut It

    Sponsored by: Cisco Systems, Inc.

    To help address the many questions about the Cisco Intercompany Media Engine, Wade Hamblin and Hakim Mehmood from the product team will post a "for Dummies" blog every 2 weeks to explain the basics and help you understand what it is, how it works, and why you should care.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Demystifying IT Network Cabling Specifications from 5e to 7A

    Sponsored by: Siemon Company

    This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.

  • Dirk Hohndel on Intel and the Linux Foundation

    Sponsored by: Intel

    In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.

  • Dual Stack Network

    Sponsored by: Cisco Systems, Inc.

    In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Enterprise Wireless LAN Security

    Sponsored by: Motorola, Inc.

    This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.

Browse by Report Type: ZigBee White Papers | ZigBee Multimedia | ZigBee IT Downloads

See more topics related to: ZigBee

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences