ComputerWeekly.com Research Library

Powered by Bitpipe.com

ZigBee Research

  • E-Guide: Choosing enterprise wireless LAN equipment

    Sponsored by: NETGEAR Inc.

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: SearchSecurity.com

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • E-Guide: Wireless LAN access control: Managing users and their devices

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.

  • Ensuring an Optimal Wi-Fi Experience: Best Practices

    Sponsored by: SearchSecurity.com

    This expert guide from SearchNetworking.com examines the available options and best practices to boost your wireless experience.

  • Exploring Opportunities in CBRS & Private Wireless Services

    Sponsored by: Equinix

    In this episode of Equinix’s Tech Talk series, get insider knowledge on the opportunities private wireless and Citizen Broadband Radio Service (CBRS) enable for service providers and enterprises. Download the webcast to hear Jim Poole, VP of Business Development at Equinix, explain the perks of private LTE and what CBRS is.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • Getting to Know the First 5G Solutions for Business

    Sponsored by: Cradlepoint

    With Cradlepoint’s recent announcement of 5G edge networking solutions for business, your company’s 5G future starts now. In this webinar, explore how 5G for business solutions can fit into your IT roadmap, the different variations of 5G and what the pathway to 5G looks like.

  • How Distributed Enterprise Networks are being Re-Architected in the Age of Cloud

    Sponsored by: Apcela

    The mainstream adoption of cloud-based services has caused enterprises to reconsider how their networks are architected. Legacy designs that focused on the data center no longer reflect the distributed nature of enterprise applications and services. Read this IDC report to learn how distributed enterprise networks are being re-architected.

  • How Early Adoption of Wi-Fi 6 Drives Performance

    Sponsored by: Zones, Inc.

    Wi-Fi 6, or 802.11ax, is one of the most important updates to Wi-Fi that has come out in the last few years. Not only will Wi-Fi 6 increase speeds, but it helps overcome some of the challenges of dense wireless deployments. In this webcast, learn more about Wi-Fi 6, including what it is, its capabilities and use cases and more.

  • HOW IT DECISION-MAKERS ARE RESPONDING TO COVID-19

    Sponsored by: Aruba Networks

    As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • How to Proactively Monitor and Troubleshoot Microsoft Teams Performance

    Sponsored by: ThousandEyes

    Now that teams are more distributed than ever, collaboration platforms like Microsoft Teams have become key to remaining productive. How can you ensure your workers are getting the best end user experience from these key resources? Leverage this webinar to learn how you can gain end-to-end visibility of the service delivery path for Teams.

  • E-Book: Standardizing Business Continuity

    Sponsored by: IBM

    Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

  • Enterprise Wireless LAN Security

    Sponsored by: Motorola, Inc.

    This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.

  • Ericom Blaze — RDP Acceleration

    Sponsored by: Ericom Software

    Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.

  • Extreme Networks Solution with NEC

    Sponsored by: Extreme Networks

    Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.

  • Facilitating “sound practices” in risk management with IBM OpenPages ORM

    Sponsored by: IBM

    This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.

  • Five Steps to Successfully Migrate to 802.11ac

    Sponsored by: Aruba Networks

    802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.

  • Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals

    Sponsored by: Enterprise Management Associates (EMA)

    Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.

  • Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value

    Sponsored by: Accenture

    Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.

  • How to Handle Mobile Devices' Impact on the Network

    Sponsored by: SearchNetworking.com

    The number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.

  • How to Save Time and Money Making Your Transition to IPv6

    Sponsored by: Cisco Systems, Inc.

    This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.

  • IBM Rational Build Forge Demos

    Sponsored by: IBM

    Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.

  • IEEE 1149.1 Use in Design for Verification and Testability at Texas Instruments

    Sponsored by: Texas Instruments, Inc.

    This document introduces those products that include ASIC cells, standard interface ICs, a bus master IC, a controller interface board for IBM compatibles, a high-speed scan interface, and software to control the scan bus.

Browse by Report Type: ZigBee White Papers | ZigBee Multimedia | ZigBee IT Downloads

See more topics related to: ZigBee

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences