Standards  >   Network Protocols  >   WLAN Protocols  >   3G Wireless  >  

Wideband Code Division Multiple Access

RSS Feed    Add to Google    Add to My Yahoo!
Wideband Code Division Multiple AccessWhite Papers (View All Report Types)
 
Next Generation Mobility Now
sponsored by Sprint
WHITE PAPER: Mobile broadband has become the alternative to Wi-Fi hotspots. Read this white paper that details the benefits of employing the use of mobile broadband, direct wireless broadband technology. Now updated for Rev A.
Posted: 30 Apr 2007 | Published: 01 Apr 2007

Sprint

HSDPA Will Transform Cellular Backhaul
sponsored by RAD Data Communications
WHITE PAPER: Control HSDPA backhaul bandwidth and cut mobile operating costs with the RAD HSDPA Hybrid Backhaul Solution. This white paper explains how RAD will enable mobile operators to realize their broadband mobile objectives for greater throughput and reduced ...
Posted: 01 Feb 2007 | Published: 01 Feb 2007

RAD Data Communications

ECI Telecom 1Net Wireless Backhaul Solution: Finding YOUR Right Path for Optimized Packet-based Backhaul
sponsored by ECI Telecom
WHITE PAPER: ECI's 1Net wireless backhaul solution provides you with a comprehensive, end-to-end solution for backhaul optimization, and options for multi-stage migration from TDM to packet at your preferred pace. Read this paper to find more.
Posted: 24 Aug 2010 | Published: 24 Aug 2010

ECI Telecom

Industry Intelligence: International Financial Reporting Standards for Hedge Funds
sponsored by Advent Software, Inc
WHITE PAPER: This paper introduces hedge funds and hedge fund service providers to IFRS.
Posted: 04 Jan 2010 | Published: 04 Jan 2010

Advent Software, Inc

Bring Your Own iPad to Work
sponsored by Aruba Networks, Inc.
WHITE PAPER: Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Aruba Networks, Inc.

A Guide to Effectively Managing Enterprise Wi-Fi Networks
sponsored by Motorola, Inc.
WHITE PAPER: In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...
Posted: 25 Oct 2007 | Published: 01 Sep 2007

Motorola, Inc.

Going Serverless at the Branch Office: Using WAN Optimization to Solve the Server Consolidation Challenge
sponsored by Expand Networks
WHITE PAPER: The Expand Accelerator is a standards-based, tightly integrated, multi-service platform that delivers a complete application acceleration solution.
Posted: 16 Jun 2008 | Published: 01 Jun 2008

Expand Networks

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Predictive Coding: The Next Frontier In Ediscovery
sponsored by Rand Secure Data
WHITE PAPER: The following white paper explores the importance of eDiscovery within the legal sector; it also provides helpful insight to common eDiscovery and keyword search pitfalls, technology recommendations to consider, and more.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Rand Secure Data

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

Ixia Black Book: Long Term Evolution - Access
sponsored by Ixia
WHITE PAPER: This in-depth guide provides a general overview of the LTE technology market and explores some informative case studies about LTE.
Posted: 25 Feb 2014 | Published: 31 Dec 2012

Ixia

Accessing A Multi-Cloud Environment
sponsored by CoreSite
EGUIDE: This expert e-guide will show you how to deal with migrating applications in the new cloud world. Also learn the four strengths to look for in a cloud management vendor and how to achieve open management in a multivendor environment.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

CoreSite

How to Conduct a Thorough CAC Readiness Assessment
sponsored by Nuance
WHITE PAPER: This informative white paper identifies the critical success factors for positioning computer-assisted coding (CAC) in your organization.
Posted: 11 Mar 2014 | Published: 28 Feb 2013

Nuance

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

Predictive inventory management: Keeping your supply chain in balance
sponsored by IBM
WHITE PAPER: Innovations such as just-in-time manufacturing bar codes and RFID tags have revolutionized supply chain management. Unfortunately these innovations have brought with it staggering amounts of data to deal with. This white paper outlines some of the major factors affecting inventory and supply chain management.
Posted: 07 Feb 2013 | Published: 31 Oct 2012

IBM

E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix Systems, Inc.
WHITE PAPER: Design and manufacturing companies need to enable global collaboration while maintaining security and control. Read this white paper to learn how centralized 3D apps and data help them accelerate time-to-market.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Citrix Systems, Inc.

Tomorrow’s ERP: Cloud, mobile access hold key to successful ERP systems
sponsored by SearchDataManagement
EBOOK: ERP is not dead. In fact, these applications are running nearly every part of many businesses. If organizations want to keep up, they're going to have to deal with cloud and mobile trends—and the inevitable hassles—changing the face of tomorrow's ERP systems.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

SearchDataManagement

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Restore Balance with Next Generation Authentication Technical Guide
sponsored by SearchSecurity.com
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

SearchSecurity.com

Complete the Microsoft® Lync™ Experience with Jabra Devices: Datasheet
sponsored by Insight and Jabra
WHITE PAPER: Access this resource for a wider offering of mobile communications devices that are optimized for Microsoft Lync, and with automated, remote, and voice/audio quality features, your business can achieve full productivity and efficiency.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

Insight and Jabra

A Practical Approach to Building a Comprehensive and Compliant RIM Program
sponsored by Iron Mountain
WHITE PAPER: This whitepaper outlines the important steps to achieve successful and compliant records and information management (RIM).
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Iron Mountain

Basics of Switching
sponsored by Global Knowledge
WHITE PAPER: A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
Posted: 05 Sep 2013 | Published: 28 Jun 2013

Global Knowledge

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

Enhance Your SaaS Application With Advanced Business Intelligence
sponsored by Information Builders
WHITE PAPER: As the SaaS market continues to explode, many providers are presenting more strategic offerings, such as advanced BI functionality. This paper warns, however, of the issues you may face when adding BI to your application and will help you make sure you're choosing the right partner.
Posted: 01 May 2013 | Published: 01 May 2013

Information Builders

Stopping Zero Day Exploits For Dummies
sponsored by IBM
EBOOK: This informative eBook examines the different threats that could compromise your security system and lead to advanced persistent threats and targeted attacks, and outlines the best strategies to keep your data safe.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Validating VoLTE: A Definitive Guide to Successful Deployments
sponsored by Ixia
WHITE PAPER: Access this guide for an extensive framework and step-by-step approach for thoroughly evaluating all aspects of a voice-over LTE implementation.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Ixia

Open Information Security Management Maturity Model (O-ISM3)
sponsored by ComputerWeekly.com
WHITE PAPER: The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement