Wireless LAN Routers Reports

Web Seminar: Routers Are Dead. Long Live the Router!
sponsored by Cisco Systems, Inc.
WEBCAST: Go "under the hood" of the revolutionary Cisco integrated services router. See the technological advances that will enable you to create a truly borderless network, while giving you the convenient, powerful network management features you crave in today's resource-challenged IT environment.
Posted: 22 Mar 2010 | Premiered: Mar 18, 2010

Cisco Systems, Inc.

Technical Brief: Next-Generation Wireless Backhaul Solutions
sponsored by Brocade
PRODUCT OVERVIEW: Many services, such as mobile Internet and mobile TV, require high bandwidth, and current backhaul infrastructures are not optimized to handle this traffic. Advanced routers and switches from Brocade enable highly scalable designs for the eventual convergence of voice and data infrastructure that can deliver new multimedia services.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Brocade

Routers are Dead; Long Live the Router
sponsored by Cisco Systems, Inc.
WEBCAST: Get a firsthand look at the next-gen routers that will enable you to create a truly borderless network, while giving you the convenient, powerful network management features you crave in today’s resource-challenged IT environment.
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Riverside Healthcare System
sponsored by Aerohive Networks
WHITE PAPER: This crucial case study discusses how a healthcare organization with four facilities utilized a WLAN solution to eliminate slow client performance, centralize configuration and monitoring and open the door to many labor-saving applications.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Aerohive Networks

Hot Tips for Securing Your Wireless Network
sponsored by Sophos
WHITE PAPER: Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.
Posted: 07 May 2013 | Published: 31 Aug 2012

Sophos

Computer Weekly – 17 November 2020: How Mastercard is taking digital payments into a new era
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Mastercard about how the credit card giant is using new technologies to take digital payments into a new era. After months of unprecedented uncertainty, we ask CIOs how they are planning for the next 12 months. And we examine how the growth in remote working will affect IT salaries. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Nov 2020

TechTarget ComputerWeekly.com

Top 10 ASEAN IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
Posted: 15 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

Beginner's guide to Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The adoption of IoT in Asia-Pacific has accelerated over the past few years, spurred by growing digitalisation across the region and the desire to improve business processes. In this e-guide, learn more about IoT developments across the region and how to leverage the technology to drive business outcomes.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Computer Weekly – 30 April 2019: Inside Huawei
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the new campus of Chinese networking supplier Huawei, to find out what the firm thinks of the controversy raging about the security of its products. Our latest buyer's guide examines storage optimisation technologies. And we look at the latest developments for technology in schools. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Apr 2019

TechTarget ComputerWeekly.com

Towards more robust internetworks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 08 Feb 2021 | Published: 02 Feb 2017

TechTarget ComputerWeekly.com