Skip to main content
 

mobility network

Results 1 - 25 of 107Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jul 30, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Shifting from a software defined networking model is the first component of a hybrid WAN. See how a hybrid WAN is ideally suited for mobility and cloud models in the whitepaper from ZK Research. Read this design guide for detailed insights into how an Intelligent WAN can improve the way your branch network operates, from headquarters to your most remote location.
Tags : 
netwroking models, business practices, cloud models
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco Mobility Express is a software-based controller function integrated on Cisco 1800 series Wave 2 AccessPoints. It is a simplified, low cost, feature rich WiFi architecture with enterprise level WLAN capability streamlined for small and mid-sized deployments. In a Cisco Mobility Express network, AccessPoint (AP) running the wireless controller function is designated as the Master AP. The other AccessPoints which are managed by this Master APare referred asSubordinate APs.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic, data center, network, equinix, equinix solutions
    
Equinix
Published By: Cisco     Published Date: Jan 05, 2015
With the right approach, you can combine the mobility of wireless with the performance of wired networks. To get up to speed on 802.11ac, we're providing an 802.11ac migration cheat sheet and webinar on-demand.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
We have now strengthened the scope of our Unified Computing System by expanding our data centre management capabilities. Download your free white paper and learn how we have become the key supplier of converged technology and services in this space.
Tags : 
ucs, datacenter, data management, mobility solutions, networking hardware, datacenter services, collaboration, ucs architect
    
Cisco
Published By: Lenovo UK     Published Date: Oct 15, 2018
One laptop is stolen every minute. But that shouldn’t deter you from enabling workforce mobility. Reduce potential risks with robust device security. Think Your Device is Secure? Think Again. When it comes to network security, devices are most prone to threats. ThinkPad Ultra Dock This ThinkPad Ultra Dock comes with a Security Lock that conveniently secures both the device and your dock to the desk with a single key.
Tags : 
    
Lenovo UK
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility
    
Absolute Software
Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics
    
Juniper Networks
Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod
    
Aerohive
Published By: Aerohive     Published Date: Oct 23, 2014
Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.
Tags : 
wireless networks, controller-less networks, the new mobility, network infrastructures
    
Aerohive
Published By: VMware AirWatch     Published Date: Oct 14, 2016
Advances in the technologies of the electronic components essential to mobility continue to yield powerful and productive mobile computers and communicators, with an amazing range of function and raw capabilities that even seasoned professionals find remarkable. There also have been dramatic improvements in wireless networks—from Wi-Fi to the broadband cellular services that continue to expand in both coverage and capacity—that offer throughput and related performance characteristics that rival what’s possible on wire. Finally, add in apps, cloud solutions and related management capabilities, and there’s never been a better time than right now to profit from a strategy that reaps the benefits of a mobile workforce—and, really, a mobile organization.
Tags : 
    
VMware AirWatch
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: Aerohive     Published Date: Jun 01, 2015
This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks, mobility network
    
Aerohive
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.