IT Services  >   Telecommunications Services  >   Wireless Services  >  

Hotspots

RSS Feed    Add to Google    Add to My Yahoo!
HotspotsReports
 
Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Intel® Centrino® Duo Mobile Technology: The Beginning of an Era of Mobile Multi-Core Computing
sponsored by Intel Corporation
PRODUCT OVERVIEW: The new Intel® Centrino® Duo mobile technology brings uncompromised performance to new heights and delivers faster performance than many desktop computers shipping today.
Posted: 24 Jul 2008 | Published: 15 May 2006

Intel Corporation

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

SonicWALL

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Leveraging Mobility to Drive Productivity and Provide a Superior IT Service Experience
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper details six ways to introduce mobility into IT service management.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

CA Technologies.

Five Major Trends for MSPs to Watch
sponsored by N-able Technologies
WHITE PAPER: This informative white paper provides excellent advice for MSPs as they navigate explosive trends like cloud computing and mobility, helping them to adapt their businesses to meet customers' evolving needs and stay one step ahead of the competition.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

What is an IT-as-a-Service Catalog and Why is it a Necessity?
sponsored by Gravitant
WEBCAST: This webcast details the importance of and effective service catalog in the cloud that can combat the need for shadow IT.
Posted: 21 Jul 2014 | Premiered: Jul 21, 2014

Gravitant

University of North Texas System Debuts IT Shared Services in the Cloud
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper introduces an ITSM solution that utilises the cloud, and  eliminates traditional infrastructure management pain points.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

FrontRange Solutions Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement