Standards  >   Network Protocols  >   WLAN Protocols  >   3G Wireless  >  

Wideband Code Division Multiple Access

RSS Feed    Add to Google    Add to My Yahoo!
Wideband Code Division Multiple AccessWhite Papers (View All Report Types)
 
HSDPA Will Transform Cellular Backhaul
sponsored by RAD Data Communications
WHITE PAPER: Control HSDPA backhaul bandwidth and cut mobile operating costs with the RAD HSDPA Hybrid Backhaul Solution. This white paper explains how RAD will enable mobile operators to realize their broadband mobile objectives for greater throughput and reduced ...
Posted: 01 Feb 2007 | Published: 01 Feb 2007

RAD Data Communications

Next Generation Mobility Now
sponsored by Sprint
WHITE PAPER: Mobile broadband has become the alternative to Wi-Fi hotspots. Read this white paper that details the benefits of employing the use of mobile broadband, direct wireless broadband technology. Now updated for Rev A.
Posted: 30 Apr 2007 | Published: 01 Apr 2007

Sprint

Demystifying VLAN Trunk Protocol
sponsored by Global Knowledge
WHITE PAPER: This detailed white paper will help you uncover the truth about the often-misunderstood Virtual Local Area Network (VLAN) Trunk Protocol, or VTP. Discover an in-depth overview of how VTP works and see how you can overcome VTP challenges to minimize network outages and more – read on to get started.
Posted: 10 Jan 2013 | Published: 31 Dec 2012

Global Knowledge

Cisco Service Provider Next Generation Networks
sponsored by Global Knowledge
WHITE PAPER: In this white paper discover how the Cisco Service Provider Next Generation Networks (IP NGN) works and how service providers are benefiting from this technology. Explore examples of configurations for different platforms and contrast the differences in the types of operating systems.
Posted: 22 Feb 2012 | Published: 22 Aug 2012

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

RFID Basics for Retailers
sponsored by Intermec
WHITE PAPER: This white paper illuminates RFID by providing an overview of RFID technology; describing the current status of relevant RFID standards initiatives; illustrating how RFID can be integrated to enhance existing wireless LAN, bar code and mobile computing systems; and providing guidance for selecting and planning RFID pilots and implementations.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Intermec

Ten Top Problems Network Techs Encounter
sponsored by Fluke Networks
WHITE PAPER: This whitepaper discusses ten common problems encountered by network technicians today and their symptoms, causes, and resolutions.
Posted: 27 Jan 2010 | Published: 01 Jul 2009

Fluke Networks

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: 802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Aruba Networks

A Guide to Effectively Managing Enterprise Wi-Fi Networks
sponsored by Motorola, Inc.
WHITE PAPER: In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...
Posted: 25 Oct 2007 | Published: 01 Sep 2007

Motorola, Inc.

Restore Balance with Next Generation Authentication Technical Guide
sponsored by SearchSecurity.com
EGUIDE: Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

SearchSecurity.com

BYOD and Beyond: How to Deliver Enterprise Data Securely Across Operating Systems
sponsored by Citrix Systems, Inc.
WHITE PAPER: Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.4, iOS 7.1 and Windows Phone and Surface 8.1 versions – and the steps you should take to maintain security and control.
Posted: 01 Jun 2014 | Published: 01 Jun 2014

Citrix Systems, Inc.

Modernize Your Approach to Authentication
sponsored by SearchSecurity.com
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

ROI Case Study: Imprivata OneSign South Shore Hospital
sponsored by Imprivata
WHITE PAPER: Read this case study to see how one hospital is benefitting after choosing a leading VDI and SSO solution that greatly improved their security and productivity rates across the facility.
Posted: 02 May 2014 | Published: 31 Mar 2014

Imprivata

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

A powerful defense against denial of service attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 16 Dec 2014 | Published: 27 Dec 2013

Citrix

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Stopping Zero Day Exploits For Dummies
sponsored by IBM
EBOOK: This informative eBook examines the different threats that could compromise your security system and lead to advanced persistent threats and targeted attacks, and outlines the best strategies to keep your data safe.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Mobilizing Windows Applications
sponsored by Citrix
WHITE PAPER: This project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
Posted: 31 Dec 2013 | Published: 31 Dec 2013

Citrix

Continuous Application Availability With EMC VPLEX
sponsored by Bull
WHITE PAPER: This whitepaper discusses the effectiveness of "continuous availability" programs as compared to traditional DR and HA, and takes a look at the EMC deployment model for continuous application availability.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Bull

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

State of Security Operations
sponsored by Hewlett-Packard Limited
WHITE PAPER: With businesses recognising the need for further investment in cyber-defence, it is essential to figure out which tools and strategies are best for your organisation. Read now and find out more about the current state of security operations in 2014.
Posted: 13 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

Defend web properties from modern threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover the challenges of defending modern web properties from modern threats, as well as an application delivery controller (ADC) that works hand in hand with advanced malware protection and high-profile security products.
Posted: 16 Dec 2014 | Published: 31 Dec 2013

Citrix

Internet Security Threat Report - 2014
sponsored by Symantec Corporation
WHITE PAPER: This in-depth guide explores today's widespread threat landscape and 7 areas that deserve special attention in the coming year.
Posted: 07 May 2014 | Published: 07 May 2014

Symantec Corporation

Breaches Happen: Be Prepared
sponsored by Symantec Corporation
WHITE PAPER: This exclusive whitepaper will teach you how to protect yourself from damaging attacks and effectively respond to them and unveils the protection and defense life cycle.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Symantec Corporation

Agile for Dummies
sponsored by IBM
EBOOK: Agile methods aren't just for cutting-edge development teams anymore, but if you're just jumping on the Agile train, it's likely you have a lot of questions. Fortunately, this e-book can help answer them, as Agile for Dummies offers a comprehensive look at Agile practices, tools, and projects.
Posted: 30 Jul 2014 | Published: 31 Dec 2012

IBM

Best Practices for a Model-Driven Development Tool
sponsored by CA Technologies.
WHITE PAPER: In this white paper, discover best practices for a model-based development tool that enables you to quickly develop complex business applications based on Agile methods and reusable software components.
Posted: 11 Jun 2014 | Published: 31 Dec 2010

CA Technologies.

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

Basics of Switching
sponsored by Global Knowledge
WHITE PAPER: A switch is a Layer 2 network device that forwards Ethernet frames based on the destination media access control (MAC) address. A switch has RJ-45 ports for connection and the intelligence to read MAC addresses to make forwarding decisions. The purpose of the switch is to quickly and accurately forward frames toward the destination.
Posted: 05 Sep 2013 | Published: 28 Jun 2013

Global Knowledge

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Information Security Magazine
sponsored by SearchSecurity.com
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement