Home Networking White Papers

(View All Report Types)
Building a Small Office Network: Getting Started
sponsored by Cisco Systems, Inc.
WHITE PAPER: Building a small office network means starting with a foundation of switches and routers. The following guide will help you understand the difference between switches and routers and develop a clear vision for what your network foundation needs.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Enhancing Guest Experiences with Unified Communications and Video Security
sponsored by Motorola, Inc.
WHITE PAPER: Consumers are in constant pursuit of the most satisfying experience — one that is immediate, seamless and customized. This is more difficult to achieve in the siloed organizational structures of today’s hospitality organizations. In this white paper, learn more about the business benefits of arming staff with a reliable communication system.
Posted: 08 Feb 2021 | Published: 21 Feb 2020

Motorola, Inc.

Audio Basics- ROOM TYPES AND MIKING ROOMS
sponsored by Shure Inc
WHITE PAPER: The optimal audio solution for any given meeting space depends on a wide range of factors, including the size of the room, the number of people involved, the number of presenters and the style of presentation. In this Shure white paper, get a sense of which microphones work best in different types of business rooms.
Posted: 08 Feb 2021 | Published: 11 Dec 2020

Shure Inc

The Future of the IT Department: Exploring the Impact of Cloud on IT Roles and Responsibilities
sponsored by IBM
WHITE PAPER: Cloud computing has made a name for itself in the enterprise computing industry today and it is likely to gain traction in the future. This does not mean the end for IT departments but their roles and responsibilities will certainly be changing. Check out this white paper to learn more about what to expect from IT in the post-cloud era.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

IBM

Find the UC Solution that Fits your Budget
sponsored by North Sydney IT and Cisco
WHITE PAPER: This informative paper examines some of the top UC solutions on the market and compares their TCO so you can see which tool will both satisfy your requirements and fit your budget.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

North Sydney IT and Cisco

Building an Ethernet-based WAN Infrastructure
sponsored by Singtel
WHITE PAPER: This exclusive paper examines a scalable Wide Area Network (WAN) solution that overcomes many of the limitations to traditional mainframe-centric infrastructures while also protecting the investments in your legacy systems. Read on to find out how you can build such an infrastructure.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

Singtel

Tools, Tips & Resources for Sharing Ideas, Leading Teams & Getting Things Done
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this white paper, uncover 4 key principles behind successful collaboration: With the right tools, leaders, and specific goals, your team could be underway to enabling business productivity and partnerships.
Posted: 06 Jan 2014 | Published: 06 Jan 2014

Citrix Online Go To Meeting

Forrester Thought Leadership White Paper: Exploring the Potential Benefits of End-to-End Convergence of Data Center Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper discloses the results of an evaluation of end-to-end storage area network/local area network (SAN/LAN) networking issues including Fibre Channel over Ethernet (FCoE) adoption.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

Cisco Systems, Inc.

Five steps to successfully migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: This brief guide gives 5 guidelines to ensuring a successful migration to 802.11ac. These include auditing the current infrastructure, evaluating capacity requirements and choosing the right access points for your needs.
Posted: 16 Apr 2014 | Published: 17 May 2013

Aruba Networks

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM