Standards  >   Network Protocols  >   WLAN Protocols  >   3G Wireless  >  

Wideband Code Division Multiple Access

RSS Feed    Add to Google    Add to My Yahoo!
Wideband Code Division Multiple Access White Papers (View All Report Types)
 
HSDPA Will Transform Cellular Backhaul
sponsored by RAD Data Communications
WHITE PAPER: Control HSDPA backhaul bandwidth and cut mobile operating costs with the RAD HSDPA Hybrid Backhaul Solution. This white paper explains how RAD will enable mobile operators to realize their broadband mobile objectives for greater throughput and reduced ...
Posted: 01 Feb 2007 | Published: 01 Feb 2007

RAD Data Communications

Next Generation Mobility Now
sponsored by Sprint
WHITE PAPER: Mobile broadband has become the alternative to Wi-Fi hotspots. Read this white paper that details the benefits of employing the use of mobile broadband, direct wireless broadband technology. Now updated for Rev A.
Posted: 30 Apr 2007 | Published: 01 Apr 2007

Sprint

The Essentials Series: Solving Network Problems Before They Occur - How to Use SNMP in Network Problem Resolution
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: The Simple Network Management Protocol can help you get a clear view into your network. Network visibility is one of the most important ways you can quickly find and eliminate issues and ensure that your network is doing everything it’s supposed to.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Ipswitch WhatsUp Gold

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

The Value of Billing Transformation in an Economic Downturn
sponsored by Amdocs Management LTD
WHITE PAPER: To cope and thrive through the economic downturn, service providers look to reducing the cost to serve and generating new revenues even more. Service Providers' billing infrastructure is a key imperative for both strategies. To address cost reduction, service providers must look at the two main drivers in this paper.
Posted: 20 Jul 2009 | Published: 01 Jul 2009

Amdocs Management LTD

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

Adaptive Packet Filtering
sponsored by Gigamon
WHITE PAPER: This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Gigamon

Impacts of Healthcare Applications on WLAN Mobility
sponsored by AirMagnet
WHITE PAPER: WLANs are the often-underestimated strategic resource that provides the foundation for the success of any mobile initiative. This paper will address how to build and manage a solid WLAN foundation that protects healthcare organizations from poor application performance, security vulnerabilities and compliance issues.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

AirMagnet

Building the Business Case for Strong Authentication
sponsored by HID
WHITE PAPER: With more than 1 billion mobile banking users last year, the need for mobile banking security improvement is only getting more dire every year.Learn how authentication in online banking has changed and what factors you should look for to balance security and convenience.
Posted: 29 Nov 2016 | Published: 07 Oct 2016

HID

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

15 Endpoint Security Suites Compared
sponsored by Symantec & Blue Coat Systems
RESEARCH CONTENT: Access Forrester's 25-criteria evaluation of endpoint security suite providers to learn market trends and uncover how 15 vendors match up.
Posted: 26 May 2017 | Published: 19 Oct 2016

Symantec & Blue Coat Systems

Best Practices for Dealing with Phishing and Next-Generation Malware
sponsored by KnowBe4
WHITE PAPER: This Osterman Research study focuses on the current security problems with email and other systems, and offers recommendations about how to improve security. Learn how to combat phishing and next-gen malware threats through a variety of best practices, beginning with user training.
Posted: 14 Dec 2016 | Published: 30 Apr 2015

KnowBe4

Global Risks Report 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The possibility of large-scale cyber attacks is among the prominent risks in 2015 in the 10th Global Risks Report from the World Economic Forum.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

DevOps Cultural and Technical Values: Leveraging Automation and the Cloud
sponsored by Chef Software
WHITE PAPER: This white paper provides an introduction to the cultural and technical values that are the foundation of DevOps. Discover what pain points you can address faster and more efficiently with this approach, using tools and methods like automation, cloud-based infrastructure, continuous delivery, and more.
Posted: 03 Nov 2016 | Published: 31 May 2015

Chef Software

DevOps, the Cloud, and AWS: Tying it All Together
sponsored by Chef Software
WHITE PAPER: This white paper explores how to implement DevOps, using an automation platform in conjunction with AWS cloud resources. Discover how this approach can decrease time to market and reduce costs. Plus, uncover some critical best practices for workflow automation.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Chef Software

Leveraging Automation for DevOps
sponsored by Chef Software
WHITE PAPER: This white paper explores how to implement automated and collaborative workflows in a way that reduces risk, ensures stability, and guarantees regulatory compliance. Discover how to create a dynamic infrastructure that will aid in your company's DevOps transformation and optimize its use of automation.
Posted: 20 Oct 2016 | Published: 30 Jun 2016

Chef Software

Drive Productivity and Efficiency by Optimizing Mobile User Experiences
sponsored by Capriza
RESEARCH CONTENT: This Ovum report examines how Capriza's mobility platform can easily enable you to develop key mobile apps across any number of devices for a dynamic workforce. Discover how to optimize important workflows by increasing access to your data and transforming legacy apps without any code or APIs.
Posted: 19 Apr 2017 | Published: 16 Sep 2016

Capriza

Project Nightingale: An API-Led Revolution in Retail IT
sponsored by MuleSoft
EBOOK: This e-book presents a hypothetical retail business and follows their journey to meet customer expectations and deliver business agility. Discover how to take a new approach to integration with API-led connectivity and microservices architectures to tackle digital transformation challenges and deliver modern, personalized customer experiences.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

MuleSoft

Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

The Cloud Architect’s Guide to iPaaS
sponsored by INFORMATICA
WHITE PAPER: This e-book explores a 2-part strategy that incorporates a cloud-based integration platform designed for agility, scale, and the role of today's cloud architect. Learn what iPaaS truly is, the importance of ESBs, and 9 laws of hybrid integration.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

INFORMATICA

Cost Savings and ROI Enabled by IBM API Connect
sponsored by IBM
WHITE PAPER: The following study conducted by Forrester consulting provides a framework to evaluate the potential financial impact of IBM API Connect on developing new opportunities for developers. Learn how 32 IBM users fared with accelerating development and time to market.
Posted: 21 Jun 2017 | Published: 28 Feb 2017

IBM

The Value of Threat Modelling
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway information security thesis series gives an overview of the value of threat modelling and describes some common modelling techniques.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ComputerWeekly.com

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games
sponsored by ComputerWeekly.com
EZINE: In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.
Posted: 25 Jul 2016 | Published: 26 Jul 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement