> Technology > Wireless
 

Wireless

Wireless is a very generic term that may refer to numerous forms of non-wired transmission, including AM and FM radio, TV, cellphones, portable phones and wireless LANs. Various techniques are used to provide wireless transmission, including infrared line of sight, cellular, microwave, satellite, packet radio and spread spectrum.
Results 1 - 25 of 399Sort Results By: Published Date | Title | Company Name
By: Sage     Published Date: Aug 31, 2015
In this report, we will examine all facets of mobile payment processing, beginning with a very brief history of mobile payments and forecasts for the future. We will then explore the benefits of mobility for small and mid-sized businesses, the ease of processing mobile payments, the equipment required and the issues small and mid-sized businesses should take into consideration when taking your business mobile.
Tags : sage, mobile payments, business mobile, mobility, wireless
     Sage
By: HP AppPulse Mobile     Published Date: Aug 10, 2015
This is an ebook about HP AppPulse Mobile, a mobile monitoring software product that makes it easy to monitor your success.
Tags : mobile, software, product, success, wireless
     HP AppPulse Mobile
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, it management
     XO Communications
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : mobile security, apps, cyber criminals, cyber security, trend micro
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : security solution, cyber attack, mobile devices, business security, user protection
     CDW-Trend Micro
By: IBM     Published Date: Jul 07, 2015
This infographic succinctly explains the value of our Mobile Platform for key stakeholders -- developers, IT managers, app owners and users, and CISOs. It also charts our four capabilities and the modular services aligned to them.
Tags : ibm, developer, app, platform, it manager
     IBM
By: IBM     Published Date: Jul 07, 2015
By 2018, company-supplied mobile phones will exceed 228 million and mobile devices will replace 63% of desktops. Are you ready?
Tags : ibm, mobile, devices, strategy, infrastructure
     IBM
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : endpoint security, desktop devices, mobile devices, byod, corporate data
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : cloud security, virtualization security, virtualization, data center, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands— while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : security, virtualization, cloud computing, trend micro, it management
     CDW-Trend Micro
By: Comcast Business     Published Date: Mar 24, 2015
Ethernet fills a number of roles in the enterprise – far more than you might initially expect. This overview helps you understand the many ways in which the networking protocol is used in business, where it makes the most impact, and the effect CIOs should expect from upcoming innovations.
Tags : ethernet, network protocol, lan, enterprise intranet, wide area ethernet
     Comcast Business
By: Comcast Business     Published Date: Mar 24, 2015
Hotels and the travelers who frequent them bear little resemblance to their counterparts from just a few years ago. The explosion of new technologies has allowed hotels to change the way they operate and has made the average traveler more techsavvy and connected than ever. Mobile devices are driving this innovation. Not only have mobile devices changed how people interact with each other, they also have changed how people expect businesses to engage with them. According to SmartBrief, 40 percent of hotel guests carry three or more mobile devices. And with global mobile data traffic growing 30 percent every year according to Cisco, there will be an estimated 4.9 billion mobile users by 2018. When these mobile users travel, will they choose your hotel? Only if you have the mobile amenities they demand. In this white paper, we will review three mobile trends that every hotelier should address, and we’ll offer recommendations on how to best address them.
Tags : travel, hotel technology, mobile devices, mobile trends, hospitality
     Comcast Business
By: Comcast Business     Published Date: Mar 24, 2015
The restaurant and bar industry is highly competitive, and many owners of these establishments struggle every day just to stay in business. In fact, approximately 40 restaurants and bars go out of business each day in the U.S. According to celebrity chef, restaurateur, and entrepreneur Robert Irvine, “Part of the problem is that they don’t have the systems and processes in place to track the key aspects of their business – not only their costs and their revenue, but what items sell the best (and by how much), what items are most profitable, who are the most productive employees, and so on.” The use of technology tools and the Internet – driven by a high-speed network connection that supports owners, staff and guests – can be the key to evolving a restaurant or bar from a struggling survivor to a thriving, successful business. Download this white paper to learn more.
Tags : hospitality, business, restaurant industry, network connection, it management
     Comcast Business
By: Comcast Business     Published Date: Mar 24, 2015
New research findings, new technologies, and the evermore urgent needs for speed and cost-efficiency are converging to drive a revolution in medicine. Supporting this convergence are high-speed secure telecommunications networks, enabling unprecedented teamwork among institutions, researchers, practitioners and patients to create a new paradigm: telemedicine, the exchange of medical information via electronic communications among dispersed facilities and patients to improve patient health. Download this white paper to learn more about telemedicine.
Tags : bandwith, ethernet communications, medicine, telemedicine, telecommunications
     Comcast Business
By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : healthcare, patient care, communication, electronic health records, remote diagnostics
     Comcast Business
By: Intacct Corporation     Published Date: Mar 31, 2014
Thinking about moving your financial apps to the cloud? Chances are, you've asked yourself the same crucial question that's applied to every strategic decision in your business: What's the ROI? A solid business case not only unlocks budget dollars, it provides a roadmap for successful deployment and maximum value.
Tags : roi, finance, cloud based financial applications, finance applications, financial management
     Intacct Corporation
By: CenturyLink     Published Date: Jul 29, 2015
Written for IT decision-makers with responsibility for eCommerce infrastructure, this CenturyLink-commissioned survey by Forrester Consulting evaluates the current adoption trends and challenges with hosted eCommerce solutions. Read this report to ensure you are investing in solutions that will bolster your eCommerce infrastructure for a superior customer experience - while also driving the agility and operational efficiency you need to stay competitive.
Tags : web and mobile performance, operation efficiency, ecommerce solutions, ecommerce infrastructure, customer experience
     CenturyLink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : app management, app security, privacy, data passing, mobile app
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
There's an app for every “that,” but are they secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.
Tags : mobile application lifecycle, application lifecycle management, security, malm, app protection
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
To maximize mobility, a nuanced strategy is the order of the day. For mobility’s transformative potential to be realized, IT needs to become a business partner that understands business drivers and then devises the technology roadmap to support everyone’s goals. Read this paper to learn more about mobility management.
Tags : enterprise mobility management, technology roadmap, mobile devices, it management, wireless
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
End users are demanding their own devices in the workplace, making IT the shepherds of a potentially unruly flock?The good news is IT can embrace BYOD with security and confidence given the right preparation and technology.
Tags : byod, mobile devices, smartphone, tablet, it management
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : mobile device management, education, educators, students, app management
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate enterprise mobility security vendors.
Tags : magic quadrant, enterprise mobility management, emm, mobility security, vendors
     MaaS360 by Fiberlink
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search