IT Systems  >   Communications Networks  >   LAN  >  

Dual-mode Wireless LAN

RSS Feed    Add to Google    Add to My Yahoo!
Dual-mode Wireless LAN White Papers (View All Report Types)
 
Discover the Power of Network Simplicity
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explains why organizations like yours need to seriously consider the value of unifying and converging wired and wireless systems in order to deal with increased network demands, reinforce security at the edge, increase the use of SaaS and more.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Transforming Your WiFi Network Into A Secure Wireless LAN
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper offers up a wireless LAN solution that will help you protect your network from mounting threats.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Fortinet, Inc.

Managing and Monitoring a Primary Wireless Network
sponsored by Intel Corporation
WHITE PAPER: Intel IT designed a highly automated approach to managing an enterprise primary wireless LAN, with a focus on service level management and monitoring. This white paper has the details.
Posted: 12 Aug 2008 | Published: 01 Feb 2007

Intel Corporation

Wireless LAN Reliability in the Unwired Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines what it takes to maximize availability in the unwired enterprise, and explores the five elements needed to make the wireless LAN as dependable as wired Ethernet.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

Locating Rogue 802.11n and Legacy Wireless Access Points
sponsored by Fluke Networks
WHITE PAPER: Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security.
Posted: 03 Oct 2008 | Published: 03 Oct 2008

Fluke Networks

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Wireless LANs Standards: Where Are We Now?
sponsored by Burton Group
WHITE PAPER: Not all standards are created equal. Some are technically elegant but achieve little market adoption. Others are broadly deployed.
Posted: 18 Jul 2008 | Published: 13 Nov 2006

Burton Group

Siemens Mobile UC - Where UC Meets Enterprise Mobility
sponsored by Siemens Enterprise Communications
WHITE PAPER: In response to increased employee mobility, companies are developing Unified Communications (UC) strategies and implementing UC solutions to enable a global work focus and ease employee communications problems.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Siemens Enterprise Communications

Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola, Inc.
WHITE PAPER: Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement