Home Radio Frequency Reports

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

TechTarget Security

Motorola Installs a Wireless LAN to Improve Communications at Kilkenny Castle
sponsored by Motorola Solutions
CASE STUDY: How did the historic Kilkenny Castle go from being a completely un-networked site where only a few staff had Internet access to a completely networked site with 90% coverage around the castle? You'll have to read this to find out.
Posted: 25 Oct 2007 | Published: 01 Aug 2007

Motorola Solutions

A Guide to Effectively Managing Enterprise Wi-Fi Networks
sponsored by Motorola Solutions
WHITE PAPER: In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...
Posted: 25 Oct 2007 | Published: 01 Sep 2007

Motorola Solutions

Presentation Transcript: Upgrading to full 802.11n
sponsored by SonicWALL
PRESENTATION TRANSCRIPT: This presentation transcript, taken from the podcast of the same name, discusses what businesses can expect to see in the final 802.11n standard and how those "full 802.11n" differences will and won't impact this year's deployments. Read on to learn more about the upcoming changes in 802.11n.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

SonicWALL

Five Steps to Successfully Migrate to 802.11ac
sponsored by Aruba Networks
WHITE PAPER: 802.11ac is quickly becoming the definitive standard for next-generation Wi-Fi. This brief resource counts down five essential steps that will help you successfully migrate to 802.11ac.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Aruba Networks

E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK: Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010

IBM

E-Guide: Choosing enterprise wireless LAN equipment
sponsored by NETGEAR Inc.
EGUIDE: 802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

NETGEAR Inc.

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Next Generation Network Management Techniques
sponsored by TechTarget Security
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

TechTarget Security

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

TechTarget ComputerWeekly.com