IT Systems  >   Communications Networks  >   Wireless Networks  >  


RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: 1) A personal area network (PAN) is the interconnection of information technology devices within the range of an individual person, typically within a range of 10 meters. For example, a person traveling with a laptop, a personal digital assistant (PDA), and a portable printer could interconnect them without having to plug anything in, using some form of wireless technology. Typically, this kind of  … 
Definition continues below.
PAN Reports
Cloud Infrastructure Foundation - A Flexible, Responsive Cloud Is Built from the Ground Up
sponsored by Egenera
WHITE PAPER: At its heart, cloud computing is a new operational and business model for IT application hosting, rather than a new technology. It promises to deliver highly reliable, highly elastic services that respond quickly and smoothly to changing user demand.
Posted: 23 Nov 2010 | Published: 23 Nov 2010


eBook - The Mobile Enterprise: Taking Wireless Networking to the Next Level
sponsored by SearchMobileComputing
EBOOK: Read this eBook to learn how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity.
Posted: 10 Sep 2009 | Published: 10 Sep 2009


PCIO Special Report, "Enterprise Modernization"
sponsored by Pure Storage
WHITE PAPER: This research report examines how government agencies can modernize enterprise systems more quickly and will provide some examples of how it's being done. Most importantly, it will discuss best practices that show how iterative, agile IT development can take root and flourish in the public sector.
Posted: 20 Sep 2016 | Published: 01 Aug 2016

Pure Storage

A Manufacturing Network Fabric Maturity Model
sponsored by Panduit
WHITE PAPER: Discover the importance of the network fabric in today's information-enabled manufacturing environments. It also outlines the steps that proactive manufacturers can take in order to capture the full value of the network for years to come.
Posted: 15 Sep 2016 | Published: 30 Oct 2015


Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management
sponsored by CA Technologies
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT.
Posted: 22 Sep 2016 | Published: 31 Jul 2016

CA Technologies

Lifesize Cloud Statistics Usage Infographic
sponsored by LifeSize
RESOURCE: This infographic lays out the growth of a cloud based unified communications service. Inside you'll see how enterprise customers have employed Lifesize's cloud computing tool, including a dissection of which industries have benefited most, and how they have used cloud communications to their benefit.
Posted: 27 Sep 2016 | Published: 27 Sep 2016


How to Achieve Transformative Business Outcomes with ITSM
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower operational costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

Red Hat CloudForms: An Economic ROI Study
sponsored by Red Hat
RESOURCE: Discover the ROI your business can realize by adopting CloudForms to simplify complex hypervisor and hybrid cloud environments across multiple providers. Download this infographic to improve the efficiency of cloud service delivery by discovering the benefits, costs, and long-term flexibility outlined here.
Posted: 13 Oct 2016 | Published: 13 Oct 2016

Red Hat

The Unexpected Cause of Shadow IT
sponsored by Logicalis
RESOURCE: The trend of going around IT departments to obtain new technologies – known as shadow IT – is risky and could make sensitive information easily accessible. Learn how software-defined data centers may be the cure for shadow IT.
Posted: 14 Oct 2016 | Published: 14 Oct 2016


Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

PAN DEFINITION (continued): …  personal area network could also be interconnected without wires to the Internet or other networks.Also see wireless personal area network (WPAN) which is virtually a synonym since almost any personal area network would need to function wirelessly. Conceptually, the difference between a PAN and a wireless LAN is that the former tends to be centered around one person while the latter is a local area network (LAN) that is connected without wires and serving multiple users. 2) In another usage, a personal area network (PAN) is a technology that could enable wearable computer devices to communicate … 
PAN definition sponsored by, powered by an online computer dictionary
Browse by Report Type:
PAN White Papers | PAN Multimedia | PAN IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement