IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Mobile Infrastructure

RSS Feed    Add to Google    Add to My Yahoo!
Mobile InfrastructureReports
 
Unified Monitoring Approach to Data Center Management
sponsored by CA Technologies.
WHITE PAPER: This whitepaper offers up a solution for managing your complex data center environment with a single interface.
Posted: 06 Feb 2014 | Published: 14 Feb 2013

CA Technologies.

Testing Embedded Systems: Do You Have the GuTs for It?
sponsored by IBM Software Group
NEWSLETTER: This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.
Posted: 14 Mar 2008 | Published: 24 Nov 2003

IBM Software Group

E-Book: Engineering the Wireless Hospital
sponsored by SearchHealthIT.com
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

SearchHealthIT.com

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

AirMagnet WiFi Analyzer
sponsored by AirMagnet
TRIAL SOFTWARE: AirMagnet WiFi Analyzer is the industry "de-facto" tool for mobile auditing and troubleshooting enterprise 802.11a/b/g/n networks. AirMagnet WiFi Analyzer solves end user WLAN issues while automatically detecting security threats and other wireless network vulnerabilities.
Posted: 08 Jun 2010 | Premiered: 15 Aug 2011

AirMagnet

A Practical Approach to Wireless 2.0
sponsored by Aerohive Networks
WHITE PAPER: Have you ever seen or experienced a Wi-Fi network that was as reliable as a light switch? Me either. That brings me to the point of this whitepaper: Wireless 2.0.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

Aerohive Networks

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Don't fall victim to security myths. This resource will help you debunk the top 10 wireless security myths floating around today. Find out the truth when it comes to firewall and intrusion detection systems, wireless security threats, using WEP to secure WIFI communication, and more.
Posted: 17 Apr 2013 | Published: 31 Dec 2012

AirTight Networks, Inc.

Mobility on Cisco Catalyst Series Switches - The Wired Side of Wireless
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco has defined a wireless architecture that provides tight integration and unification of wired and wireless networks. Read this paper to learn about the key features and business benefits of Cisco Catalyst Series switches and Cisco Unified Wireless Networks.
Posted: 26 May 2010 | Published: 01 Jul 2008

Cisco Systems, Inc.

Feature and Technical Overview: BlackBerry Enterprise Server for Microsoft Exchange
sponsored by BlackBerry
PRODUCT OVERVIEW: The BlackBerry® Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. Continue reading for an overview of the features and technical aspects for the BlackBerry® Enterprise Server for Microsoft Exchange.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement