WiFi Hotspots Reports

Underexposed risks of public Wi-Fi hotspots
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

TechTarget ComputerWeekly.com

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network
sponsored by Motorola Solutions
WHITE PAPER: This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own.
Posted: 19 Aug 2009 | Published: 01 May 2007

Motorola Solutions

Clean Wireless: Adding security, performance, manageability and value to wireless deployments
sponsored by SonicWALL
BROCHURE: Businesses want wireless now. So what's holding it up? The answer lies in ongoing IT concerns over: Wireless Security; Wireless Performance; Wireless Manageability; and Wireless Value. Read this brochure for an overview of these four important points.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

SonicWALL

Small Cells and U!
sponsored by RUCKUS Networks
PRESENTATION TRANSCRIPT: This presentation transcript explores the possibility of making the process of connecting to Wi-Fi services as easy, seamless and secure as today's 3G cellular networks
Posted: 21 Dec 2011 | Published: 21 Dec 2011

RUCKUS Networks

A Proactive Approach To Field Service 5 Priorities For Implementing Strong Service Foundations
sponsored by ServiceNow
EBOOK: This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

ServiceNow

CW Middle East - April-June 2022: UAE and UK researchers work on 'trustworthy' cloud OS for datacentres
sponsored by TechTarget ComputerWeekly.com
EZINE: Imperial College London is embarking on a three-year project with an Abu Dhabi-based group of researchers to find ways for datacentre operators and cloud providers to secure their infrastructure. Also read how Dubai is positioning itself to reap the benefits of a promising global market for drone technology.
Posted: 22 Mar 2022 | Published: 07 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly – 3 May 2022: A prescription for digital accessibility at Boots
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, millions of people have difficulties when using websites – we find out how Boots is making its e-commerce offering fully accessible. Our new buyer's guide examines communications as a service. And we talk to Trainline's CTO about how the rail app provider survived and thrived post-pandemic. Read the issue now.
Posted: 03 May 2022 | Published: 03 May 2022

TechTarget ComputerWeekly.com

CW Nordics - May-July 2021: Denmark takes a top-down approach to gender equality in tech entrepreneurship
sponsored by TechTarget ComputerWeekly.com
EZINE: Tech Nordic Advocates has adopted a new approach to closing the gender gap in Danish technology startups, looking to emulate Canada's top-down approach.
Posted: 17 May 2021 | Published: 27 May 2021

TechTarget ComputerWeekly.com

CW Nordics - February-April 2022: Swedish drone app gets life-saving equipment to heart attack victims
sponsored by TechTarget ComputerWeekly.com
EZINE: Thanks to an app developed in Sweden, drones can get life-saving equipment to heart-attack victims before emergency services can arrive on the scene, potentially increasing patient survival rates. Also in this issue, read about a Swedish bank's time-saving robots.
Posted: 15 Feb 2022 | Published: 24 Feb 2022

TechTarget ComputerWeekly.com

The rise of edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
Posted: 18 May 2021 | Published: 19 May 2021

TechTarget ComputerWeekly.com