IT Services  >   Telecommunications Services  >   Wireless Services  >  

WLAN Hotspots

RSS Feed   
WLAN Hotspots Reports
 
Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Small Cells and U!
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

Ruckus Wireless

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

SonicWALL

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola, Inc.
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola, Inc.

CW Benelux ezine February 2019
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence has released a lot of details about the attempt to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 31 Jan 2019 | Published: 07 Feb 2019

ComputerWeekly.com

CW Nordics May 2018
sponsored by ComputerWeekly.com
EZINE: In a country like Sweden which has embraced IT to transform life and work and where concepts like cashless society are welcomed by many, the proliferation of artificial intelligence is inevitable.
Posted: 18 May 2018 | Published: 24 May 2018

ComputerWeekly.com

CW Benelux ezine November 2018
sponsored by ComputerWeekly.com
EZINE: The Netherlands is a hotbed for digital developments, whether it's developing a port that will host autonomous ships or the proliferation of contactless payments. Its population is open to new ideas and it has a rich tech startup scene with a large community of techies.
Posted: 02 Nov 2018 | Published: 08 Nov 2018

ComputerWeekly.com

Preventing Outages with Predictive Analytics
sponsored by Splunk
WHITE PAPER: $105,302. That's the mean business cost of an IT incident – and poor monitoring and response systems are often to blame. Discover how AIOps can offer a proactive, predictive alternative.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

Splunk

How Converged Infrastructure Can Fast-Track IT as a Service Delivery
sponsored by Pure Storage
RESOURCE: Read this custom article to learn how IT teams can leverage converged infrastructure (CI) to fast-track IT-as-a-service without having to rip and replace everything already in place. You can refresh without re-architecting, consume technology as Opex or CAPEX, and more.
Posted: 11 Dec 2018 | Published: 11 Dec 2018

Pure Storage

It Shouldn't Be This Hard! Providing Better Support With Less Resources
sponsored by LogMeIn Rescue
VIDEO: Click to learn how organizations are re-approaching their support strategies to keep up with heightening customer demands, including new and emerging processes, technologies, and methodologies that can help.
Posted: 02 Aug 2018 | Premiered: 30 Jul 2018

LogMeIn Rescue
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement