Hardware  >   Networking Hardware  >   Internetworking Hardware  >   Routers  >  

Intelligent Mobile Gateways

RSS Feed   
Intelligent Mobile Gateways White Papers (View All Report Types)
 
ICT Today: Designing Wi-Fi Networks for High Capacity
sponsored by Ekahau
WHITE PAPER: Designing the Wi-Fi needed for today's users can be a daunting task if you don't know where to start.Learn how to design a high-quality Wi-Fi network that supportsthe increasing demand for capacity in this white paper.
Posted: 12 Jun 2017 | Published: 31 May 2016

Ekahau

Meeting the Network Requirements of Intelligent Transportation Systems
sponsored by TechData - Digi
WHITE PAPER: In this white paper, learn how to choose a router and vendor that can provide your organization with Global 3G/4G LTE options, centralized mass configuration, remote troubleshooting and more.
Posted: 10 Apr 2017 | Published: 29 Jan 2016

TechData - Digi

Locating Rogue 802.11n and Legacy Wireless Access Points
sponsored by Fluke Networks
WHITE PAPER: Learn more about the omnidirectional and unidirectional search methods for locating rogue access points to improve wireless network security.
Posted: 03 Oct 2008 | Published: 03 Oct 2008

Fluke Networks

Riverside Healthcare System
sponsored by Aerohive Networks
WHITE PAPER: This crucial case study discusses how a healthcare organization with four facilities utilized a WLAN solution to eliminate slow client performance, centralize configuration and monitoring and open the door to many labor-saving applications.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Aerohive Networks

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

SD-WAN for SMBs and Enterprises
sponsored by TELoIP Inc.
WHITE PAPER: It is expected that moving to software-defined networks will enable organizations to meet the rampant need for bandwidth while reducing costs. Learn how to help your business take advantage of broadband pricing across multiple aggregated service provider connections, while increasing reliability to MPLS levels.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

TELoIP Inc.

IBM System x3650 M4 Servers Data Sheet
sponsored by IBM and Intel.
WHITE PAPER: Explore this datasheet to learn about a scalable server package that can save your enterprise money without sacrificing speed or availability.
Posted: 07 Jul 2014 | Published: 14 Sep 2013

IBM and Intel.

Desktop virtualization architecture designed for on-demand growth
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this exclusive, informative resource to find out how one data center solution can provide you with the support you need for desktop virtualization.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Cisco Systems, Inc and Citrix

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Ekahau Wi-Fi Design Infographic
sponsored by Ekahau
RESEARCH CONTENT: This resource includes design considerations, best practices, and tips & tricks for high performance Wi-Fi.
Posted: 09 Jun 2017 | Published: 28 Feb 2017

Ekahau

Varian Medical Systems Employees Can Be Productive Wherever, Whenever
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

Isotrak Empowers Fleets to Deliver With Aeris IoT Connectivity
sponsored by Aeris
CASE STUDY: In this case study, discover how Isotrak used Aeris IoT Services to enable global cellular connectivity with integrated data analytics for IoT to create access to real-time data, reporting, and insights via reliable network connectivity for their delivery fleets.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Aeris

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

How to enhance your network for the future
sponsored by ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Enterprise Mobile Management: The 11 Providers That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, Forrester Research evaluates the 11 most significant EMM vendors from 2015 and provides an analysis to help I&O professionals select the right partner for their EMM. Read on to determine why today's EMM provides a model for future unified application and device management and drives secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Handbook: Making Mobile BI Work: Real World Advice and Strategies
sponsored by SearchBusinessAnalytics
WHITE PAPER: This informative white paper offers a three-part series of advice on building and deploying mobile BI apps from consultants and IT managers who have already been through the process. It discusses what you need to do to provide fast mobile BI performance among other helpful tips.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchBusinessAnalytics

Mobility Management Selection Guide
sponsored by SearchSecurity.com
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

SearchSecurity.com

Device Provisioning and Lifecycle Management
sponsored by Atos
CASE STUDY: Read this case study to find out how device provisioning and lifecycle management--two of the least technological practices at any tech company--are inspiring the latest innovation in digital workplace transformation, and why data is the key to making it all come together.
Posted: 28 Nov 2017 | Published: 31 Oct 2017

Atos

VINCI Improved Their Bottom Line by Increasing Operational Visibility
sponsored by Splunk Services UK Ltd
CASE STUDY: This case study reveals how VINCI Construction UK was able to increase their operational efficiency by improving their troubleshooting protocols to be proactive rather than reactive. This frees up their mobile IT team to think more long-term, rather than continuously scrambling to solve problems as they arise.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

Splunk Services UK Ltd

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

How to Monetize IoT: Unlock Real Revenue Potential
sponsored by Aeris
WHITE PAPER: Explore the monetization of IoT with a cloud-based IoT platform that facilitates M2M communications, delivers flexibility and agility, adapts to any business model or ongoing digital transformation, and more.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Aeris

Network Purchasing Intentions 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and Tech-Target, reveals the IT networking trends and spending priorities for European IT professionals in 2012.
Posted: 30 Jul 2012 | Published: 30 Jul 2012

ComputerWeekly.com

Mobile device protection: tackling mobile device security risks
sponsored by SearchSecurity.com
EGUIDE: The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

SearchSecurity.com

Proactive security measures: How to prevent malware attacks
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.
Posted: 21 Oct 2012 | Published: 30 Aug 2012

SearchSecurity.com

Exploring new web browser security capabilities
sponsored by SearchSecurity.com
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

SearchSecurity.com

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement