Wireless Hardware

Wireless access has special security considerations. Many wired networks base the security on physical access control, trusting all the users on the local network, but if wireless access points are connected to the network, anyone on the street or in the neighbour office could connect. The most common solution is wireless traffic encryption.
Results 151 - 175 of 181Sort Results By: Published Date | Title | Company Name
By: BlackBerry     Published Date: Oct 03, 2012
Get the big picture on how the upcoming software upgrade to the BlackBerry® PlayBookTM tablet makes mobile computing easier than ever.
Tags : enterprise mobile computing, blackberry, rim, mobile computing, wireless hardware, wireless phones, collaboration
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Get future ready with BlackBerry Enterprise Server v5. Join a free webcast to understand how upgrading to BlackBerry Enterprise Server v5 will get your organization ready for the next generation in mobile device management: BlackBerry Mobile Fusion.
Tags : blackberry enterprise server, mobile device management, mdm, mobile computing, mobile solutions, wireless hardware, wireless phones, wireless security
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : mobile security, corporate intranet, blackberry, secure connectivity, wireless hardware, wireless security, collaboration
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
When it comes to the office of the future, what many people envision is not an office at all -- it's access to the tools and resources they need without going to an actual office. This white paper discusses how to deliver this level of access today.
Tags : mobile computing, mobile workforce, mobile office, blackberry, mobile workers, smart phones, wireless application software, wireless hardware, wireless messaging, wireless phones
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
This resource explores what you should look for in any mobile UCC solution. Explore the changing enterprise and top three considerations to make when considering any mobile UCC strategy.
Tags : ucc, collaboration, ucc strategy, mobile ucc solution, blackberry, mobile computing, smart phones, wireless application software, wireless communications, wireless hardware
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : tablet environments, security, application security, corporate tablet use, mobile computing, wireless hardware
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry, mobile computing, wireless hardware, wireless security, collaboration
     BlackBerry
By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : intermec, tablet, computing, ipad, computers, compatibility, wireless application software, wireless hardware, application integration, application performance management, ebusiness, sales automation, server virtualization, workforce management, business intelligence, content integration, document management, records management, spend management, employee monitoring software
     Intermec
By: CDW Vmware     Published Date: Aug 02, 2012
Following the sale of a company division housing its corporate data center, Source Interlink had to relocate core IT operations. Teaming with CDW, they were able to not only relocate, but lower capital and operating costs, reduce their carbon footprint, and increase efficiency.
Tags : data, center, optimization, cdn, interlink, operation, relocate, move, capital, operating, cost, carbon footprint, efficiency, server, virtualization, blade, servers, storage, management, power
     CDW Vmware
By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : quick, start, data, recovery, vmware, enterprise, data, center, components, protect, recover, secure, threat, intruders, natural disaster, recovery, plan, event, disaster, critical
     CDW Vmware
By: Intermec     Published Date: Sep 07, 2011
In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : intermec, smart phones, reliability, handheld devices, ip ratings, drop ratings, mobile data systems, pda, wireless communications, wireless hardware, wireless infrastructure, wireless phones
     Intermec
By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus, network security, remote access, remote network management, access control, ipsec, security management, mobile workers, wireless hardware, vulnerability management
     Avocent
By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory, server utilization, memory ballooning, vmkernal swapping, capacity planning, vmware esx 4.0, active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking
     Kingston
By: Phoenix Contact USA     Published Date: Nov 09, 2010
A WirelessHART gateway with WLAN connection means better communication, flexibility and increased efficiency for your HART sensor network.
Tags : industrial wireless technology, wirelesshart, wirelesshart gateway, wifi, wireless communications, wireless hardware, wireless infrastructure, wireless security, wlan
     Phoenix Contact USA
By: Focus     Published Date: Jun 01, 2010
This FREE brief details what you need to know when evaluating wireless solutions.
Tags : information technology, networking, wireless, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wlan
     Focus
By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments, wireless, mobile data systems, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless service providers
     Texas Instruments
By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage, etiquette, personal use, blogging, security, wireless, wireless hardware, wireless phones
     MessageLabs
By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : wireless device management, mobile device management, mobile workers, asset management, commontime, wireless, mobile computing, wireless hardware, wireless infrastructure
     CommonTime
By: Xirrus     Published Date: May 04, 2007
Get a technical foundation for deploying a high performance Wi-Fi network. Learn the details of how they work/compete, where they complement and where they're most effective.
Tags : wifi, wireless, 802.11, xirrus, wi fi, wimax, mobile computing, mobile data systems, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless security, wlan
     Xirrus
By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
     Infor
By: GAO RFID Inc.     Published Date: Feb 28, 2007
Learn how manufacturers today can leverage RFID technology to help them run more efficient operations that help minimize production down time, optimize material and parts inventories, improve and maintain optimal labor output.
Tags : rfid, wireless, rfid tags, supply chain, supply chain management, gao, gao rfid, gao group, wireless hardware, wireless infrastructure
     GAO RFID Inc.
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.