Access Point WLAN Reports

Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER: Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007

Motorola Solutions

Distributed Network Architecture for WiMAX: For a Digital, Converged, Mobile IP World
sponsored by Motorola Solutions
PRODUCT LITERATURE: The world is moving to IP and service providers in all geographies are embracing the shift.
Posted: 15 Jun 2007 | Published: 01 Jun 2007

Motorola Solutions

Presentation Transcript: Wired and Wireless Network Infrastructures-- Planning Tips to Improve Network Performance and Reduce Costs
sponsored by Belden
PRESENTATION TRANSCRIPT: This presentation transcript, taken from the webcast of the same name, will help inform network designers, planners and installers of important considerations in planning to help them optimize combined network performance and reduce project costs. It will provide recommendations and tips for installing or upgrading a structured cabling plant.
Posted: 24 Apr 2009 | Published: 24 Apr 2009

Belden

Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER: This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007

AT&T Corp

CW@50: What was making the news in June
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
Posted: 08 Feb 2021 | Published: 03 Jun 2016

TechTarget ComputerWeekly.com

Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Nov 2020

TechTarget ComputerWeekly.com

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Sep 2020

TechTarget ComputerWeekly.com

Computer Weekly 50th anniversary special
sponsored by TechTarget ComputerWeekly.com
EZINE: It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.
Posted: 08 Feb 2021 | Published: 22 Sep 2016

TechTarget ComputerWeekly.com

First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem
sponsored by Intel Corporation
WHITE PAPER: Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance.
Posted: 03 Apr 2009 | Published: 02 Apr 2009

Intel Corporation

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Addressing Municipal Pain Points with ConnectIV CX and AI
sponsored by Intervision
WHITE PAPER: AI-powered solutions can help government agencies address key municipal pain points like high call volumes, low citizen satisfaction, and compliance issues. Learn how ConnectIV CX leverages AI to transform these challenges into opportunities for improved service delivery. Read the full white paper.
Posted: 23 Jul 2024 | Published: 24 Jul 2024

Intervision

Privilege access governance close the gap between privileged access and standard user identities
sponsored by One Identity
WHITE PAPER: Explore how to unify identity management and provisioning processes, eliminate silos, and simplify compliance with One Identity's Privileged Account Governance. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024

One Identity

A Computer Weekly Buyer's Guide to Wireless Networks
sponsored by TechTarget ComputerWeekly.com
EBOOK: Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

ITSM Problem Management: What Are Your Pain Points?
sponsored by ServiceNow
EGUIDE: If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
Posted: 08 Feb 2021 | Published: 20 Jun 2016

ServiceNow

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

TechTarget ComputerWeekly.com

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020

TechTarget ComputerWeekly.com

DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021

TechTarget ComputerWeekly.com

Insurance Premium Pricing: Pain Points and Solutions
sponsored by SAS
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll learn why automating data extraction systems is crucial for overcoming insurance pricing obstacles. By reducing the reliance on manual processes, insurers can not only improve the accuracy of their data but also minimize operational errors. Read on now to learn more.
Posted: 28 Nov 2024 | Published: 28 Nov 2024

TOPICS:  .NET
SAS

Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER: Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: This Analyst Report provides an overview of the Privileged Access Management (PAM) market, evaluating leading vendors and their solutions. It offers insights into the evolving landscape, focusing on cloud security, identity management, and advanced features. Read the full report to learn how to select the right PAM solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER: As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

IBM Hybrid Cloud Mesh Product Guide
sponsored by Aliado
WHITE PAPER: As the network perimeter is everywhere, security must move with it and be in place at the point of access. This e-book explains how to secure remote access and build user trust using IBM Hybrid Cloud Mesh.
Posted: 27 Nov 2024 | Published: 27 Nov 2024

Aliado

What you need to know about Application Security Observability
sponsored by Contrast Security
INFOGRAPHIC: As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 12 Sep 2024 | Published: 12 Sep 2024

Contrast Security

Application Security observability
sponsored by Contrast Security
INFOGRAPHIC: As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT: As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024

Cloudflare

Why Just Securing Human Identities Is Not Enough
sponsored by CyberArk
WEBCAST: If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
Posted: 21 Aug 2024 | Premiered: Aug 21, 2024

CyberArk

Secure Access Growth Opps
sponsored by AT&T and LevelBlue
ANALYST REPORT: Explore the latest report on Secure Access Service Edge (SASE) from Frost & Sullivan. Uncover key insights into why businesses are opting for Managed Security Service Providers (MSSP) and how a SASE unified cloud-based platform can drive operational efficiency and cost savings.
Posted: 27 Aug 2024 | Published: 28 Aug 2024

AT&T and LevelBlue

Zero Trust Network Access
sponsored by Cloudflare
PRODUCT OVERVIEW: Zero trust philosophy is now at the core center of many organizations' security strategies, and yet many struggle to find an offering that can effectively deliver on these principles. Cloudflare Zero Trust Network Access (ZTNA) is an all-in-one solution that has helped existing users realize many benefits. Read on to learn more.
Posted: 27 Nov 2024 | Published: 13 Dec 2023

TOPICS:  .NET
Cloudflare

Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER: Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024

Cobalt Iron

7 types of networks and their use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: A computer network is an interconnected system of devices, represented as network nodes, that share information, data and resources among each other. Not all networks are the same. In this e-guide, learn about the seven most common types of networks, their benefits and use cases.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com