Find White Papers
Home
About Us
List Your Papers
    
> Technology > Wireless

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Wireless

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.
Results 151 - 175 of 1932Sort Results By: Published Date | Title | Company Name
White Paper Published By: SAS     Published Date: May 12, 2016
This paper examines the barriers to adoption from an IT and end-user perspective, and shows how self-service analytics in general – and SAS Visual Analytics in particular – can eliminate these barriers. Self-service analytics empowers users to truly exploit the wealth of data available to them, while ensuring that the IT organization maintains governance and control over that data.
Tags : 
sas, business analytics, it organization, networking, it management
    
SAS
White Paper Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers
    
Kaspersky
White Paper Published By: IBM     Published Date: May 09, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, mobile, hybrid, buyer's guide, mobile applications
    
IBM
White Paper Published By: Ruckus Wireless     Published Date: May 05, 2016
Wi-Fi has perpetually been touted as a rapidly expanding technology. But its growth on educational campuses has been limited. Here are have 9 common myths about wi-fi deployment that we have debunked in this whitepaper.
Tags : 
ruckus wireless, wi fi, higher ed, myths, education
    
Ruckus Wireless
White Paper Published By: Ruckus Wireless     Published Date: May 05, 2016
Password-based (PEAP, TTLS) networks experience high rates of user disruption based on password changes. Disconnected devices try to connect back to the network causing severe user disruption. So, what’s the solution to this? Certificate-based wi-fi, of course!
Tags : 
ruckus wireless, wi fi, passwords, certificate wifi, user experience
    
Ruckus Wireless
White Paper Published By: Ruckus Wireless     Published Date: May 05, 2016
Passwords kick Wi-Fi’s @ss. About 40% of Help Desk tickets are password related, and some estimates are $118/student/year in password resets. Don’t blame the Wi-Fi, fix the problem.
Tags : 
ruckus wireless, wifi, certificate wifi, passwords, help desk
    
Ruckus Wireless
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about setting up an API Strategy.
Tags : 
api, strategy, value, enterprise, lifecycle
    
MuleSoft
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about the top tech trends a CIO needs to know.
Tags : 
tech trends, cio, digital transformation, applications, data
    
MuleSoft
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about MIT increasing its IT clock speed.
Tags : 
mit, clock, speed, digital transformations, education
    
MuleSoft
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about rethinking IT for digital transformation.
Tags : 
digital, transformation, customer, enterprise, applications
    
MuleSoft
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about how Coca Cola accelerates customer centered innovations.
Tags : 
coca cola, customer, innovations, agility, low cost
    
MuleSoft
Webinar Published By: MuleSoft     Published Date: May 02, 2016
This is a webinar about the path to becoming a mobile enterprise.
Tags : 
mobile, enterprise, applications, scalable, wireless
    
MuleSoft
Case Study Published By: Pegasystems     Published Date: May 02, 2016
The successful launch of an online portal has given telecommunications company Oi the confidence to pursue an ambitious digital transformation initiative
Tags : 
pegasystems, digital transformation, digitisation, customer service, customer engagement
    
Pegasystems
White Paper Published By: Pegasystems     Published Date: May 02, 2016
This report, sponsored by Accenture and Pegasystems, explores how companies are managing their digital transformation initiatives, their goals, drivers and challenges, and how they are boosting their digital capabilities.
Tags : 
pegasystems, digital transformation, analytics, mobile marketing, social media
    
Pegasystems
White Paper Published By: Pentaho     Published Date: Apr 28, 2016
Today, the need for self-service data discovery is making data governance a charged topic. As business-driven data discovery emerges as a fundamental need, the ability to ensure that data and analytics are trustworthy and protected becomes both more difficult and more imperative. This research explains how to manage the barriers and risks of self-service and enable agile data discovery across the organization by extending existing data governance framework concepts to the data-driven and discovery-oriented business. You’ll learn: - The implications of the "freedom vs. control" paradox - How to design for iterative, "frictionless" discovery - Critical checkpoints in data discovery process where governance should be in place
Tags : 
pentaho, governed data, data and analytics, governance framework, freedom vs control
    
Pentaho
White Paper Published By: Pentaho     Published Date: Apr 28, 2016
As data warehouses (DWs) and requirements for them continue to evolve, having a strategy to catch up and continuously modernize DWs is vital. DWs continue to be relevant, since as they support operationalized analytics, and enable business value from machine data and other new forms of big data. This TDWI Best Practices report covers how to modernize a DW environment, to keep it competitive and aligned with business goals, in the new age of big data analytics. This report covers: • The many options – both old and new – for modernizing a data warehouse • New technologies, products, and practices to real-world use cases • How to extend the lifespan, range of uses, and value of existing data warehouses
Tags : 
pentaho, data warehouse, modernization, big data, bug data analytics
    
Pentaho
White Paper Published By: Pentaho     Published Date: Apr 28, 2016
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : 
pentaho, best practices, hadoop, next generation analytics, platforms
    
Pentaho
Webinar Published By: IBM     Published Date: Apr 28, 2016
Why good mobile apps are not good enough: Measure and move your mobile app to greatness
Tags : 
ibm, mobile, applications, apps, mobile apps
    
IBM
White Paper Published By: Adobe     Published Date: Apr 27, 2016
Discover how to measure and optimize your apps so they keep customers coming back for more.
Tags : 
adobe, mobile, app, marketing, marketing trends
    
Adobe
White Paper Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app
    
IBM
White Paper Published By: Adobe     Published Date: Apr 22, 2016
This white paper uncovers the numerous document productivity features that employees want across PCs and mobile devices.
Tags : 
mobility, mobile devices, cloud, cloud-based, cloud-based productivity apps
    
Adobe
White Paper Published By: Cisco     Published Date: Apr 20, 2016
See Jack? Oh no. Jack is frustrated. He wants to know something: Why can't the people at his agency meet and collaborate on the web with anybody, anywhere, at a moment's notice, without worrying about security?
Tags : 
cisco webex, security, fedramp, web conferencing, video conferencing
    
Cisco
White Paper Published By: Cisco     Published Date: Apr 20, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
cisco webex, meeting center, security, web conferencing, video conferencing
    
Cisco
White Paper Published By: Cisco     Published Date: Apr 20, 2016
Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing, a FedRAMP-compliant service. As a FedRAMP-compliant solution provided by the market leader in web and video conferencing, Cisco WebEx Web Conferencing lets you: • Easily meet face to face with meeting participants from other locations • See and hear the same information at the same time with attendees • Collaborate and increase productivity without the need for travel • Make meetings more engaging with high-definition (HD) video, audio, and content sharing
Tags : 
cisco webex, web conferencing, productivity, connectivity, government agencies
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: 802.11, Bluetooth, CDMA, GPS, Mobile Computing, Mobile Data Systems, Mobile Workers, PDA, RFID, Smart Phones, WiFi, Wireless Application Software, Wireless Communications, Wireless Hardware, Wireless Infrastructure, Wireless Messaging, Wireless Phones, Wireless Security, Wireless Service Providers, WLAN

Search