Infrared Wireless

RSS Feed    Add to Google    Add to My Yahoo!
Infrared Wireless Reports
25 Matches
Overview Of Near Field Communication
sponsored by ComputerWeekly.com
BOOK: This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

ComputerWeekly.com

Offer Enterprise-Grade Wi-Fi Connectivity Without Compromise
sponsored by Aerohive Networks
VIDEO: Learn how you can offer enterprise-grade Wi-Fi connectivity without compromise in this short video.
Posted: 03 Feb 2017 | Premiered: 30 Dec 2016

Aerohive Networks

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

CW+ Quocirca report: Reducing complexity and cost in mobile deployments
sponsored by ComputerWeekly.com
WHITE PAPER: The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Posted: 21 Oct 2011 | Published: 04 Oct 2010

ComputerWeekly.com

Citrix XenMobile and Windows 10 - Unified Endpoint Management in a mobile, cloud enabled world
sponsored by Citrix
WHITE PAPER: With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Download this white paper to discover Windows 10 management and security features supported by XenMobile.
Posted: 17 Mar 2017 | Published: 17 Mar 2017

Citrix

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

802.11n Primer
sponsored by Aerohive Networks
WHITE PAPER: In this paper, we will look at the basic elements of 802.11n functionality, with an emphasis on how it differs from WLAN technologies in use today. Our primary focus will be on the major methods that 802.11n uses to deliver on the claim of large increases in throughput and reliability.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

Aerohive Networks

Gone in a Flash
sponsored by Information Security Magazine
JOURNAL ARTICLE: From USB drives to MP3 players to DVDs, portable storage media are an end user's dream and a security manager's nightmare. We evaluated six device control tools that can help you rest easier.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Information Security Magazine

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

Digital Workplace Transformation In Financial Services
sponsored by Microsoft
WHITE PAPER: A digital divide has opened up between modern customer facing digital systems and the old-fashioned technology used by employees in the financial services workplace. Workplace digital transformation is a process that seeks to close this gap. Learn about how to close this enterprise digital divide, why it matters, and how to build your foundation.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Microsoft

Open Information Security Management Maturity Model (O-ISM3)
sponsored by ComputerWeekly.com
WHITE PAPER: The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Musings on data centres – volume 2
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analyst Clive Longbottom discusses the key issues in managing and designing datacentres, in this series of 12 articles.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

IT Handbook: Energy Efficient Cooling
sponsored by SearchDataCenter.com
EBOOK: This expert handbook explains how to set up a data center cooling monitoring system, while looking at how increasing server inlet temperatures can optimize cooling efficiency and outlines methods for building hot-aisle/cold-aisle containment systems. Lastly, explore detailed criteria for selecting and implementing economizers in your data center.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchDataCenter.com

Technology, media and telecommunications predictions 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 11 Jan 2017 | Published: 11 Jan 2017

ComputerWeekly.com

Musings on datacentres
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Clive Longbottom discusses the key issues in managing and designing data centres.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

The CIO's Guide to Wireless in the Enterprise
sponsored by BlackBerry
WHITE PAPER: Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

Plantronics Wireless Density: Whitepaper
sponsored by Insight and Plantronics
WHITE PAPER: This white paper breaks down the four considerations that must be dealt with when installing wireless headsets.
Posted: 12 Nov 2013 | Published: 12 Nov 2009

Insight and Plantronics

E-Book: Engineering the Wireless Hospital
sponsored by SearchHealthIT.com
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

SearchHealthIT.com

Engineering the Wireless Hospital
sponsored by CDW Healthcare
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this CDW Healthcare e-book to learn how these obstacles can be eliminated.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

CDW Healthcare

Engineering the Wireless Hospital
sponsored by Aerohive Networks
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Aerohive Networks

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement