wireless

Results 226 - 250 of 558Sort Results By: Published Date | Title | Company Name
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network, wireless knowledge, mobile messaging, mobile device, data access, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : 
mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
By empowering mobile users with interactive access to mission-critical systems, Good Mobile Intranet increases the ROI of your existing IT investments. Read this white paper to learn more about how to deliver mobile solutions that provide an intuitive user experience.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Maintaining security while providing mobile workers with access to the information they need, when and where they need it, is complex. This white paper helps you understand the risks associated with mobile applications, handhelds and wireless networks—then shows you how Good Mobile Messaging helps you address these issues.
Tags : 
wireless, mobile, wireless security, mobile messaging, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
DMX Music has always been at the leading edge of technology. As remote access to e-mail became a viable business solution, DMX Music's IT department began to consider the possibilities a wireless messaging system could bring to its business. Read this case study to learn what they found out.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Flack + Kurtz wanted a centrally managed wireless communications solution, delivered over an integrated device that did not rely on the end user to login or synchronize to stay current. The new solution also had to function in Europe, Asia and other places employees traveled. Read this case study to learn how Good™ Mobile Messaging gave them exactly what they wanted.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : 
wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi, wireless
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, networking, wireless
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2008
Are you looking to reduce the operational cost of your existing wireless LAN, and to make it support mission-critical, real-time applications and 802.11n? At the same time, are you challenged with the cost and complexity associated with most next-generation wireless LAN architectures? Check out the enterprise-class, cost-effective new cooperative control architecture from Aerohive Networks. In this real-world case study, you’ll see how Aerohive Networks' cooperative control architecture combines the linear cost modeling of autonomous APs and the operational advantages of controller-based approaches.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, wireless
    
Aerohive
Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code
    
Mocana
Published By: Sprint     Published Date: Oct 15, 2010
As businesses increasingly demand mobile options for employees, Sprint has introduced a service for wholesale providers called Wholesale Mobile Integration (WMI), which integrates wireless and office telephones on the same phone number.
Tags : 
sprint wholesale, wireless integration, business communication, mobile phone, wholesale mobile integration, voip
    
Sprint
Published By: Sprint     Published Date: Oct 18, 2010
This white paper outlines the many network considerations one must take into account when choosing to deploy an M2M solution.
Tags : 
sprint wholesale, cellular, hybrid networks, m2m deployment, wide-area wireless networks, local-area wireless networks
    
Sprint
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read about how Symantec provides the security needed to protect valuable information without hindering productivity. This white paper documents how Symantec helps identify, authorize, inspect and protect, so companies feel comfortable with their employees working from anywhere and from any device.
Tags : 
mobile, wireless, cloud computing, virtualization, data storage, data management, symantec, smart phones, rsa, cloud applications, data loss prevention, encryption, dlp, business technology, data center
    
CDW Symantec
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this free white paper, WLAN Market Trends and Drivers, for a better understanding of both the most compelling scenarios and value propositions that are driving the WLAN market.
Tags : 
wlan market, wireless lan, it infrastructure, mobility, business technology
    
HP OMG Mobile Workforce
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this paper and think beyond BYOD access by considering the critical need to have unified visibility, concurrent control of wired and wireless networks.
Tags : 
byod, bring your own device, wireless lan, wlan, mobile devices, mobile workforce, mobility, wireless, business technology
    
HP OMG Mobile Workforce
Published By: HP OMG Mobile Workforce     Published Date: Nov 27, 2012
Download this Gartner Analyst report to learn why HP is positioned as a leader in Wired and Wireless LAN Access Infrastructure.
Tags : 
wlan, lan, gartner, wireless access, wireless lan, wireless, business technology
    
HP OMG Mobile Workforce
Published By: LivePerson     Published Date: Jun 24, 2013
A great mobile chat solution should not require a substantial amount of additional administrative or IT burden. It should be an extension of your existing desktop chat, allowing you to leverage the very same agents, the same agent tools, the same administrative tools, and the same IT platform.
Tags : 
liveperson, wireless, mobile, chat solution, e-commerce, in-store spending, customer engagement, mobile app
    
LivePerson
Published By: Extreme Networks     Published Date: Sep 15, 2016
Read this in-depth white paper to learn how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : 
extreme networks, wireless, cloud, cloud networks, networking, network, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions, enterprise applications, business technology
    
Extreme Networks
Published By: Extreme Networks     Published Date: Sep 15, 2016
Here’s what is covered: - Overview of the rapid evolution of wireless LANs - The Ins and outs of Cloud-Managed Networking - The many benefits of a Cloud-Managed Network - Top considerations you need to know when evaluating solutions
Tags : 
extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions, enterprise applications, business technology
    
Extreme Networks
Published By: Interactive Intelligence     Published Date: Dec 02, 2010
How a contact center deploys and manages eServices - non-voice interaction channels such as email, chat, SMS and social media - is the key to offering electronic services that attract modern tech-savvy customers. Learn about eServices best practices from Sheila McGee-Smith, founder of McGee-Smith Analytics, and Tim Passios, Director of Solutions Marketing at Interactive Intelligence, and how three diverse companies successfully utilize eServices to their advantage.
Tags : 
interactive intelligence, sms, media channel, short message service, wireless, mobile communications, gsm, social media
    
Interactive Intelligence
Published By: IBM     Published Date: Nov 13, 2008
Improve operational efficiencies with next-gen networks and servicesThere has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Tags : 
ibm, operations management, tivoli, value-added services, operational support systems, wireless, ibm, power, cooling, tivoli, netcool solutions, operational efficiencies, efficiency, ip multimedia subsystems, ims, fixed-mobile convergence, operational support systems, oss, value-added services, vas
    
IBM
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.