IT Systems  >   Communications Networks  >   Wireless Networks  >  

Wireless Personal Area Networks

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Personal Area Networks Reports
 
Cloud Infrastructure Foundation - A Flexible, Responsive Cloud Is Built from the Ground Up
sponsored by Egenera
WHITE PAPER: At its heart, cloud computing is a new operational and business model for IT application hosting, rather than a new technology. It promises to deliver highly reliable, highly elastic services that respond quickly and smoothly to changing user demand.
Posted: 23 Nov 2010 | Published: 23 Nov 2010

Egenera

eBook - The Mobile Enterprise: Taking Wireless Networking to the Next Level
sponsored by SearchMobileComputing
EBOOK: Read this eBook to learn how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity.
Posted: 10 Sep 2009 | Published: 10 Sep 2009

SearchMobileComputing

Sonora Quest Labs Runs Converged System for Better Flexibility and More Value
sponsored by NTT ICT
VIDEO: In this video case study, see how by implementing HPE's Converged System 240, Sonora Quest Labs was able to improve their VM flexibility and deliver greater value to their organization as a whole.
Posted: 08 Sep 2016 | Premiered: 12 Jan 2016

NTT ICT

Empowering Users and Unlocking Flexible Video Conferencing Setups
sponsored by Cisco
EGUIDE: This e-guide highlights how video conferencing technology is changing, and how to leverage these improvements to create a more effective and flexible conferencing deployment.
Posted: 16 Aug 2016 | Published: 11 Aug 2016

Cisco

Cloud-based Disaster Recovery Service Grabs Spotlight
sponsored by Databarracks
EGUIDE: Cloud-based disaster recovery has emerged as an affordable, flexible method for providing application availability following a disaster event. This e-guide provides insight into cloud DR including strengths, issues, different model types, and more.
Posted: 23 Sep 2016 | Published: 22 Sep 2016

Databarracks

Digital Business: CFOs and CIOs Find Success Through Collaboration
sponsored by SAP/Lenovo/Intel
WHITE PAPER: As digitalization and connectivity continue to change IT's function, CIOs are taking responsibility for leading innovation. Learn how to reenergize the CIO/CFO dynamic to both advance the interests of the business, as well as drive digital innovation.
Posted: 06 Sep 2016 | Published: 31 Dec 2015

SAP/Lenovo/Intel

2016 Survey: Wireless Security Trends
sponsored by Fortinet, Inc.
RESOURCE: Learn what 1300 IT decision makers have to say about the state of wireless security. Access now for insights into the top security risks, the position of wireless as the most vulnerable part of the network, and what IT leaders are doing to protect enterprise systems.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

Fortinet, Inc.

Prepare for the Future with Agile IT
sponsored by Red Hat
RESOURCE: Discover in this paper how to deliver a strong, consistent foundation for your modern environments with bimodal IT, as well as balance conventional and agile IT so you can keep your core business running smoothly while innovating for the future. Read on to transform IT delivery through servers with greater workload densities.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Red Hat

Unified Infrastructure Management for Databases: An Overview
sponsored by CA Technologies
WHITE PAPER: Discover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix.
Posted: 23 Sep 2016 | Published: 31 Dec 2014

CA Technologies

IDC: Rethinking the Network as a Security Sensor and Enforcer
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.
Posted: 08 Sep 2016 | Published: 30 Oct 2015

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement