High Speed Downlink Packet Access Reports

HSDPA Will Transform Cellular Backhaul
sponsored by RAD Data Communications
WHITE PAPER: Control HSDPA backhaul bandwidth and cut mobile operating costs with the RAD HSDPA Hybrid Backhaul Solution. This white paper explains how RAD will enable mobile operators to realize their broadband mobile objectives for greater throughput and reduced ...
Posted: 01 Feb 2007 | Published: 01 Feb 2007

RAD Data Communications

A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019

TechTarget ComputerWeekly.com

Presentation Transcript: Upgrading to full 802.11n
sponsored by SonicWALL
PRESENTATION TRANSCRIPT: This presentation transcript, taken from the podcast of the same name, discusses what businesses can expect to see in the final 802.11n standard and how those "full 802.11n" differences will and won't impact this year's deployments. Read on to learn more about the upcoming changes in 802.11n.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

SonicWALL

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Enterprise Wireless LAN Security
sponsored by Motorola Solutions
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola Solutions

An Introduction to Quantum Lifecycle Management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

TechTarget ComputerWeekly.com

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

The Swiss Army Knife for the Network Analyst
sponsored by Riverbed Technology, Inc.
CASE STUDY: This exclusive case study covers a tool that helped one company with their network and protocol analysis.
Posted: 31 Jul 2014 | Published: 03 Aug 2013

Riverbed Technology, Inc.

The Network Impact of 802.11n
sponsored by Aerohive Networks
WHITE PAPER: With the adoption of 802.11n, concerns over the capabilities of wireless LAN technology have become concerns that affect the whole network, not just the first hop across the radio. Read this paper to find out so much more.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

Aerohive Networks

A Guide to Effectively Managing Enterprise Wi-Fi Networks
sponsored by Motorola Solutions
WHITE PAPER: In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...
Posted: 25 Oct 2007 | Published: 01 Sep 2007

Motorola Solutions