IT Services  >   Telecommunications Services  >   Wireless Services  >  

Public Access WLAN

RSS Feed    Add to Google    Add to My Yahoo!
Public Access WLANReports
 
Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

SonicWALL

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Intel® Centrino® Duo Mobile Technology: The Beginning of an Era of Mobile Multi-Core Computing
sponsored by Intel Corporation
PRODUCT OVERVIEW: The new Intel® Centrino® Duo mobile technology brings uncompromised performance to new heights and delivers faster performance than many desktop computers shipping today.
Posted: 24 Jul 2008 | Published: 15 May 2006

Intel Corporation

Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

From MSP to CSP: Making the Transition
sponsored by Egenera
WEBCAST: Watch this webcast to find out how MSPs and enterprises can simplify and automate the delivery of IT services through the implementation of public, private and hybrid cloud services.
Posted: 12 Aug 2014 | Premiered: Jan 22, 2014

Egenera

7 Tips on Becoming an IT Service Broker
sponsored by Rackspace
WHITE PAPER: This exclusive whitepaper explores seven important tips for transforming IT into a service broker.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Rackspace

How Pace-Setting Companies Approach the Latest Tech Trends
sponsored by IBM
WHITE PAPER: Innovation is the lifeblood of today's IT organizations -- if you're not ahead of the pack, you're falling behind. In this report, explore the results of a survey of over 1,200 IT decision-makers and find out how successful, pace-setting organizations are approaching the latest technology trends.
Posted: 27 Aug 2014 | Published: 31 Dec 2012

IBM

Boost Data Center Agility with Data Center Infrastructure Management
sponsored by nlyte Software
VIDEO: This webinar focuses on how to make your data center more agile with effective infrastructure management.
Posted: 12 Aug 2014 | Premiered: 26 Jun 2014

nlyte Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement