Wireless Local Area Network Routers Reports

Technical Brief: Next-Generation Wireless Backhaul Solutions
sponsored by Brocade
PRODUCT OVERVIEW: Many services, such as mobile Internet and mobile TV, require high bandwidth, and current backhaul infrastructures are not optimized to handle this traffic. Advanced routers and switches from Brocade enable highly scalable designs for the eventual convergence of voice and data infrastructure that can deliver new multimedia services.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Brocade

Riverside Healthcare System
sponsored by Aerohive Networks
WHITE PAPER: This crucial case study discusses how a healthcare organization with four facilities utilized a WLAN solution to eliminate slow client performance, centralize configuration and monitoring and open the door to many labor-saving applications.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Aerohive Networks

Routers are Dead; Long Live the Router
sponsored by Cisco Systems, Inc.
WEBCAST: Get a firsthand look at the next-gen routers that will enable you to create a truly borderless network, while giving you the convenient, powerful network management features you crave in today’s resource-challenged IT environment.
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Web Seminar: Routers Are Dead. Long Live the Router!
sponsored by Cisco Systems, Inc.
WEBCAST: Go "under the hood" of the revolutionary Cisco integrated services router. See the technological advances that will enable you to create a truly borderless network, while giving you the convenient, powerful network management features you crave in today's resource-challenged IT environment.
Posted: 22 Mar 2010 | Premiered: Mar 18, 2010

Cisco Systems, Inc.

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

Computer Weekly – 30 April 2019: Inside Huawei
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Apr 2019

TechTarget ComputerWeekly.com

Focus ASEAN: Next-generation networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G.
Posted: 08 Feb 2021 | Published: 28 Aug 2017

TechTarget ComputerWeekly.com

Guide to Workplace Collaboration Tools
sponsored by TechTarget
RESOURCE: The secret is out about the benefits of using a cloud-based workplace collaboration tool, which companies rely on to increase employee productivity while in the midst of a content tsunami. Participate in our survey today for complete access to a printable chart, and start comparing 10 top cloud collaboration vendors & features for your company.
Posted: 08 Feb 2021 | Published: 12 Jun 2019

TechTarget

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Towards more robust internetworks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 08 Feb 2021 | Published: 02 Feb 2017

TechTarget ComputerWeekly.com