IT Systems  >   Communications Networks  >  

Local Area Networks

RSS Feed    Add to Google    Add to My Yahoo!
Local Area NetworksWhite Papers (View All Report Types)
 
Garena Success Story
sponsored by IBM
WHITE PAPER: In this white paper, discover how a software company was able to find the right infrastructure as a service (IaaS) provider to deliver on-demand, secure, and scalable services for the online gaming community.
Posted: 13 Oct 2014 | Published: 31 Dec 2011

IBM

The Promise and Pitfalls of 802.11n
sponsored by Fluke Networks
WHITE PAPER: This white paper discusses the pitfalls that might arise such as increased power output, multipath signal propagation and "smart" antenna designs which affect range and performance.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Fluke Networks

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

Media Conversion in Video Security and Surveillance Systems
sponsored by Transition Networks, Inc.
WHITE PAPER: This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Transition Networks, Inc.

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008

FireEye

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.

Brocade FCoE Solutions for I/O Convergence
sponsored by Brocade
WHITE PAPER: Fibre Channel over Ethernet is extending the reliability benefits and service of Fibre Channels to LANs and other Ethernet networks. Learn how this approach enables flexible, scalable, and simplified data center fabrics that support increasingly powerful applications and growing amounts of data.
Posted: 11 Jun 2010 | Published: 11 Jun 2010

Brocade

Netsocket Virtual Network for Distributed Enterprises
sponsored by Netsocket
WHITE PAPER: This exclusive paper examines a virtual network solution that offers a low-cost, efficient, and centrally-managed virtual network specifically designed for the enterprise LAN and WAN edge network deployment.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Netsocket

Ten Steps to an Enterprise Mobility Strategy
sponsored by iPass Inc.
WHITE PAPER: Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement