IT Systems  >   Communications Networks  >   LAN  >  

Wireless LAN

RSS Feed    Add to Google    Add to My Yahoo!
Wireless LANReports
 
Bringing iPads in the classroom – New requirements to consider
sponsored by SearchSecurity.com
EGUIDE: Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

SearchSecurity.com

Readying Your Network for Video Collaboration
sponsored by SearchSecurity.com
EGUIDE: In this exclusive E-Guide from SearchUnifiedCommunications.com, learn more about the intelligent network and how telepresence and visual collaboration is changing the modern enterprise. Uncover the extranet and desktop video requirements driving 2012 telepresence trends and how the iPad is changing enterprise video-conferencing strategies.
Posted: 16 Apr 2012 | Published: 16 Apr 2012

SearchSecurity.com

Myth vs. Reality: Cloud-Managed Wireless LAN and the Primary Access Network
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide debunks common misconceptions associated with cloud-managed wireless LAN (WLAN) offerings. Separate fact from fiction and discover the opportunity of next-generation WLAN by reading on now.
Posted: 13 May 2013 | Published: 13 May 2013

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Network Evolution E-Zine: Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by SearchSecurity.com
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

SearchSecurity.com

Converged Management for Wired and Wireless Networks
sponsored by Cisco Systems, Inc.
PRODUCT OVERVIEW: Discover how Cisco’s Prime Network Control System (NCS), a converged management platform for wired and wireless networks, can help you improve operational efficiencies, reduce operating expenses, and lower capital expenditures for your organization.
Posted: 21 Mar 2012 | Published: 30 Nov 2011

Cisco Systems, Inc.

E-Guide: Expert tips for utilizing mobile access and VDI
sponsored by LogMeIn, Inc.
EGUIDE: Mobile devices are starting to support virtual desktop infrastructure (VDI) clients, leaving many managers wondering just how practical they are.  This e-guide highlights using a mobile device as a VDI client, accessing mobile UC with virtual desktops, and uncovers top challenges you should watch for.
Posted: 03 May 2011 | Published: 03 May 2011

LogMeIn, Inc.

Building Secure Wireless LANs
sponsored by Aerohive Networks
WHITE PAPER: This white paper provides a holistic view of Wi-Fi security, offering guidelines to deploy a wireless network that’s as secure as your wired one.  
Posted: 01 Jun 2011 | Published: 31 May 2011

Aerohive Networks

Tech Guide: Desktop Virtualization and the Network
sponsored by Dell, Inc.
EGUIDE: Discover the impact desktop virtualization and virtual desktop infrastructure have on your network.
Posted: 02 Jan 2013 | Published: 23 Feb 2012

Dell, Inc.

The Economics of Cooperative Control – Protocols are Free
sponsored by Aerohive Networks
WHITE PAPER: Instead of regurgitating an architecture where costly, centralized controllers are needed, Aerohive followed the original intent of the 802.11 standard designers more closely and brought the technology to maturity. This paper explores how inter-AP protocols can execute the same functions performed by centralized controllers with lower cost.
Posted: 01 Apr 2011 | Published: 30 Mar 2011

Aerohive Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement