IT Services  >   Telecommunications Services  >   Wireless Services  >  

WiFi Hotspots

RSS Feed    Add to Google    Add to My Yahoo!
WiFi HotspotsReports
 
Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

SonicWALL

Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

Intel® Centrino® Duo Mobile Technology: The Beginning of an Era of Mobile Multi-Core Computing
sponsored by Intel Corporation
PRODUCT OVERVIEW: The new Intel® Centrino® Duo mobile technology brings uncompromised performance to new heights and delivers faster performance than many desktop computers shipping today.
Posted: 24 Jul 2008 | Published: 15 May 2006

Intel Corporation

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Rx Systems Provide Around the Clock Support to 4800 UK Pharmacies with CentraStage
sponsored by CentraStage
CASE STUDY: This case study takes a look at how remote monitoring and management tools can help enhance your service delivery speeds and ensure system reliability.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

CentraStage

Exploring Business and IT Friction: Myths and Realities
sponsored by BMC Software, Inc.
WHITE PAPER: This whitepaper explores the sources of friction between business users and IT and offers up recommendations on how to adjust your strategy to minimize these problems.
Posted: 27 Feb 2014 | Published: 17 Apr 2013

BMC Software, Inc.

Measure your ITSM Investments
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper covers how to transform your IT service management approach to better align with business goals. It also presents a customer-centric ROI method.
Posted: 06 Mar 2014 | Published: 10 Jan 2013

Hewlett-Packard Company

Automated Management and Monitoring for your IT System
sponsored by CentraStage
WEBCAST: This brief video explores the benefits of automated IT monitoring and management and how your business can best utilize this tool.
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement