IT Systems  >   Communications Networks  >   LAN  >  

Dual-mode Wireless LAN

RSS Feed    Add to Google    Add to My Yahoo!
Dual-mode Wireless LAN White Papers (View All Report Types)
 
Wireless Security Survey
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Driving Innovation: The Wireless LAN in Healthcare
sponsored by Siemens
WHITE PAPER: This white paper highlights the features and benefits of a reliable and secure wireless infrastructure and provides an overview of the many applications that are enabled by WLAN technology.
Posted: 14 Nov 2006 | Published: 01 Sep 2006

Siemens

Preparing the WLAN for Voice Communications WP
sponsored by Avaya Inc.
WHITE PAPER: Companies at the cutting edge are finding it takes planning to implement effectively and that some of their assumptions about the current state of their wireless.
Posted: 09 Jun 2008 | Published: 01 May 2005

Avaya Inc.

Unified Mobility Services in the New Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the ins and outs of a unified mobility services architecture that can help you realize all the benefits of a “less-wired” network.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

Enterprise Wireless LAN Security
sponsored by Motorola, Inc.
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola, Inc.

Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER: This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007

AT&T Corp

Enabling High-Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn about the specific challenges of deploying iPads in the enterprise, how to configure an iPad for a wireless land area network (WLAN), and a specific WLAN solution that offers scalable performance in a high density network -- ideal for the mobile workplace.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

Aruba Networks

The Network Impact of 802.11n
sponsored by Aerohive Networks
WHITE PAPER: With the adoption of 802.11n, concerns over the capabilities of wireless LAN technology have become concerns that affect the whole network, not just the first hop across the radio. Read this paper to find out so much more.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

Aerohive Networks

Top 10 Reasons Enterprises Prefer Juniper Wireless
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the ten characteristics and features any WLAN solution should offer to support the transformational trends your business is making and meet the many challenges of today's enterprises.
Posted: 21 Aug 2012 | Published: 31 Jul 2012

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement