IT Services  >   Telecommunications Services  >   Wireless Services  >  

WiFi Hotspots

RSS Feed    Add to Google    Add to My Yahoo!
WiFi Hotspots Reports
Underexposed risks of public Wi-Fi hotspots
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009


Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Intel® Centrino® Duo Mobile Technology: The Beginning of an Era of Mobile Multi-Core Computing
sponsored by Intel Corporation
PRODUCT OVERVIEW: The new Intel® Centrino® Duo mobile technology brings uncompromised performance to new heights and delivers faster performance than many desktop computers shipping today.
Posted: 24 Jul 2008 | Published: 15 May 2006

Intel Corporation

2015 Technology and Talent Development Report: The IT Manager View
sponsored by Cisco Systems, Inc.
WHITE PAPER: Many IT managers are reporting a shortage in skilled job candidates. It's clear that there's never been a better time to get the inside edge on how you can propel your IT career, or break into the IT industry. Get your free copy of the 2015 Technology and Talent Development Report: The IT Manager view now to learn more.
Posted: 18 Sep 2015 | Published: 31 Aug 2015

Cisco Systems, Inc.

Top Ten Criteria for Selecting a Managed Services Provider
sponsored by IBM
WHITE PAPER: This white paper breaks down the top 10 criteria you should look for when selecting a managed services provider.
Posted: 02 Sep 2015 | Published: 31 Mar 2015


How to Capitalize on the Complex Cyber Threat Landscape
sponsored by LogicNow
WHITE PAPER: In this white paper, you'll discover how managed service providers and IT service providers can help their clients mitigate risk in this increasingly complex cyber threat landscape
Posted: 24 Aug 2015 | Published: 31 Dec 2014


Server Management: Imrpove Availability and Reduce Costs
sponsored by IBM
WHITE PAPER: This report is a guide for the 10-step process that will ensure a smooth managed infrastructure service implementation.
Posted: 01 Sep 2015 | Published: 16 Apr 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement