Standards  >   Network Protocols  >   WLAN Protocols  >  

IEEE 802.11

RSS Feed    Add to Google    Add to My Yahoo!
IEEE 802.11 Reports
 
Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Why Wi-Fi Quality is so Important to the End-user
sponsored by Extreme Networks
WHITE PAPER: This exclusive whitepaper offers an in-depth look at Wi-Fi's history, and where it's headed in the future. Read on to learn more.
Posted: 28 Oct 2014 | Published: 28 Oct 2014

Extreme Networks

How to Get Better and Faster with Wireless-N
sponsored by Cisco Systems, Inc.
WHITE PAPER: When will your business begin using next-generation wireless technology? Wireless-N (802.11n technology) is already in users' newer devices—laptops, desktops, IP phones, and smartphones. Continue reading to learn more about Wireless-N, it's business advantages and best practices.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by SearchSecurity.com
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

SearchSecurity.com

802.11n Technology
sponsored by Meraki
WHITE PAPER: This paper summarizes the benefits of a wireless LAN (WLAN) network for an introduction to Multiple-In Multiple-Out (MIMO) technology. Read on to learn so much more.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

Meraki

Tired of Rogues - Solutions for Detecting & Eliminating Rogue Wireless Networks
sponsored by AirDefense Inc.
WHITE PAPER: This paper provides an overview of the different types of rogue wireless devices, the risks faced by enterprises due to their proliferation and multiple approaches to detecting and mitigating them.
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

E-Book: Leveraging 802.11n for Increased Coverage and Performance
sponsored by SearchNetworking.com
EBOOK: This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

SearchNetworking.com

Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks
WHITE PAPER: Network managers want to limit access to only authorized users and users need assurance they are accessing the right network. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
Posted: 21 Aug 2006 | Published: 01 May 2006

Fluke Networks

Alcatel-Lucent Enterprise Wireless LAN (WLAN) Key Steps to Successfully Migrate to 802.11ac
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: In this white paper, uncover the 5 essential steps to follow when migrating to 802.11ac WLAN, the next-generation Wi-Fi.
Posted: 30 Oct 2013 | Published: 16 Jun 2013

Alcatel-Lucent Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement