Standards  >   Network Protocols  >   WLAN Protocols  >  

Wireless Ethernet Standards

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Ethernet StandardsWhite Papers (View All Report Types)
 
802.1x - Implementing and Deploying Methods
sponsored by Global Knowledge
WHITE PAPER: You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.
Posted: 26 Jul 2013 | Published: 09 Jul 2013

Global Knowledge

Ixia Black Book: 802.11ac Wi-Fi Benchmarking
sponsored by Ixia
WHITE PAPER: Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Ixia

Top 7 applications for 802.11ac Gigabit Wi-Fi
sponsored by Aruba Networks
WHITE PAPER: This brief guide shows the top 7 use cases for the new 802.11ac Wi-Fi and highlights how this provides improved speed and capacity.
Posted: 15 Apr 2014 | Published: 17 May 2013

Aruba Networks

802.11ac Deployment Considerations
sponsored by Extreme Networks
WHITE PAPER: This informative resource examines deployment considerations for getting the most value from the first wave of 802.11ac wireless products, discussing how your organization can best reap the benefits of the latest in Wi-Fi technology.
Posted: 20 May 2014 | Published: 20 May 2014

Extreme Networks

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks
WHITE PAPER: Network managers want to limit access to only authorized users and users need assurance they are accessing the right network. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
Posted: 21 Aug 2006 | Published: 01 May 2006

Fluke Networks

What IT Managers Need to Know About IP Surveillance
sponsored by D-Link
WHITE PAPER: The video surveillance market is in the throes of transition. IP surveillance is rapidly taking over from traditional analog CCTV. Within the next three years more than half the surveillance cameras used in North America will be IP cameras, according to the research firm Frost & Sullivan. Read this whitepaper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

D-Link

802-11AC Demystified
sponsored by Xirrus
WHITE PAPER: This informative paper takes an in-depth look at 802.11ac, a wireless networking solution that can help your organization meet the exploding need for greater wireless performance and accessibility.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Xirrus

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

Building High Performance Networks with 802.11ac
sponsored by Xirrus
WHITE PAPER: This resource takes an inside look at the 802.11ac wireless networking standard, and offers tips and tactics to help you approach wired-equivalent performance per user.
Posted: 29 Jul 2013 | Published: 31 Dec 2012

Xirrus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement