IT Services  >   Telecommunications Services  >   Wireless Services  >  

WiFi Hotspots

RSS Feed    Add to Google    Add to My Yahoo!
WiFi HotspotsWhite Papers (View All Report Types)
 
A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Delivering IT as a Service with a Software-Defined Data Center
sponsored by VMware, Inc.
WHITE PAPER: This crucial white paper takes an in-depth look at IT as a Service (ITaaS), examining the benefits it's provided organizations across the globe.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

VMware, Inc.

Demand Pricing That Matches Business Value – The Radical Sourcing Trend for 2013
sponsored by Asigra
WHITE PAPER: This guide explores the nature of IT pricing models and how current obsolete models are costing MSPs a fortune.
Posted: 18 Apr 2014 | Published: 04 Jan 2013

Asigra

IBM System x x86 servers: Earning consistently high customer satisfaction through strength in hardware and support services
sponsored by IBM and Intel
WHITE PAPER: This white paper details the value of an exceptional support team.
Posted: 14 Apr 2014 | Published: 21 Aug 2013

IBM and Intel

Leveraging the Power of the Peloton to Lead Change
sponsored by Global Knowledge
WHITE PAPER: This white paper combines the concept of the peloton with one of the most widely accepted approaches for enabling change in organizations: John P. Kotter's 8 Steps for Enabling Change.
Posted: 05 Sep 2013 | Published: 19 Jul 2013

Global Knowledge

Improve IT maturity to accelerate your move to cloud computing
sponsored by IBM
WHITE PAPER: This whitepaper examines the endpoint management capabilities required to simplify the delivery of IT capacity, enhance patch management for virtualized systems, speed the delivery of IT-services and improve information access.
Posted: 26 Mar 2014 | Published: 26 Mar 2014

IBM

As Cloud Empowers Lines of Business, Challenges for IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper covers the results of a thorough survey that was conducted to determine the impact of cloud technology on IT departments.
Posted: 11 Dec 2013 | Published: 16 Sep 2013

Cisco Systems, Inc.

Alcatel-Lucent Enterprise Wireless LAN (WLAN) Key Steps to Successfully Migrate to 802.11ac
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: In this white paper, uncover the 5 essential steps to follow when migrating to 802.11ac WLAN, the next-generation Wi-Fi.
Posted: 30 Oct 2013 | Published: 16 Jun 2013

Alcatel-Lucent Enterprise

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement