Sort results by: Published date | Company name
Showing items 1-25

Optimize the In-Store Experience [ Source: Wipro Technologies ]

December 2012- Many retailers are having a hard time breaking out of the economy's current stagnation. Store optimization that goes beyond a building's four walls to take into account consumers' access to information, preferences for communication, and multi-channel purchasing methods can help retailers attract more customers and make the most of the customers they already have.

Care Management and the Future of Health Care [ Source: Wipro Technologies ]

December 2012- Medical care in the United States suffers from problems related to cost, quality, and fragmented delivery, and compliance to new models and reforms. What's needed, instead, is an approach to health care that is proactive, integrated, and patient-centric.

New strategies are evolving to propel health care in those directions. A new technology solution, known as integrated care management, is emerging to address the important processes and functions of those strategies.

Conquering today's Bring Your Own Device Challenges [ Source: Aruba Networks ]

March 2012- A BYOD solution should automate the device onboarding process for employees and guests, as well as the administration and enforcement of policies, by gathering information about the context of the device, user and connection. BYOD also requires real-time visibility and reporting to quickly measure, enforce, and meet compliance mandates.

Gartner Strategic Road Map for Network Access Control [ Source: Aruba Networks ]

March 2012- Long derided as an overhyped concept, network access control (NAC) has emerged as an important solution for mitigating the risks of consumerization. Network and security managers will use NAC to retain control of the network in a "bring your own device" (BYOD) environment.

The End of the Overlay: Unified Networks Arrive [ Source: Interop ]

March 2010- Unified networking is now firmly established as one of the key directions for LAN deployments going forward. As is the case with the improvement in visibility and strategic direction resulting from the ratification of the 802.11n standard,there is little question today regarding the viability of the unified approach, nor with the system vendors’ ability to field product lines implementing the concept. Learn about the benefits of unified networks in this whitepaper from Farpoint Group. ...

Future-Forward To 802.11n [ Source: Lionbridge Technologies ]

March 2009- The crucial interoperability of wireless network devices built around the 802.11 standard is threatened by the advent of new and faster technologies. The IEEE is trying to cope by introducing the 802.11n standard--but it’s still in draft form. Meanwhile, how can manufacturers cope with the confusion and promise surrounding 802.11’s future? The situation is outlined, and a forward path, based on strategic testing, is proposed.

Comparing Wi-Fi RFID And IR-RFID Real-Time Locating Systems For Use In Healthcare [ Source: Versus Technology ]

August 2009- Real-time locating systems (RTLS) are becoming mainstream in healthcare environments. Although currently there is only a 29% adoption rate, this number is expected to grow to nearly 70% by 2011. However, there are many different RTLS offerings as well as remarkable variation in the implementation processes, functionality, and long-term success with each system. This white paper explores the implementation costs between two popular RTLS solutions: Wi-Fi RFID (radio frequency identification) from Cisco and hardwired Infrared-RFID from Versus, and ...

How To Design A Low-Power Wireless Sensor Network [ Source: Greenpeak Technologies ]

June 2008- Driven by the demand for “green” technology and better use of power, a new generation of extreme low-power wireless networks is being developed for use in machine to machine networks, for industrial and control applications, as well as for health, security, and other purposes. This article is about this new approach to truly wireless networks –- without any network cables or power lines.

Business Class 802.11n: Ready To Deploy [ Source: D-Link ]

April 2009- Today’s Web applications, IP video streams, VoIP systems, and mobile devices are placing more and more demand on wireless networks. This white paper explores 802.11n technology and applications, while offering business leaders a solid educational foundation for making wireless deployment and purchasing decisions.

Upgrading Your Data Network For Voice And Video [ Source: NetForecast ]

November 2008- NetForecast explores voice and video network issues, IP telephony challenges, network immunity benefits and more in this presentation on upgrading your data network. This presentation includes information on the key components for establishing an effective network architecture to support remote users.

Infrastructure And Security Planning For WLANs [ Source: dBrn Associates, Inc. ]

November 2008- Michael F. Finneran, Principal, dBrn Associates, discusses802.11, WLANs, WiFi, WLAN switching options, security, WEP, and more in this recent presentation.

Breaking Down The Technology And Organizational Silos [ Source: KPMG LLC ]

May 2008- The growth of mobility, extension of the enterprise, and business expectations for instant gratification are leading to Unified Communication, federated connectivity, and automated provisioning of end-to-end services. KPMG takes a look at challenges and solutions ahead in this presentation.

Network Security Meets Building Security [ Source: Cisco ]

April 2008- What does network convergence mean for IT? Cisco takes a look at physical security and IT in this presentation.

Wireless Security: Key Trends And Issues [ Source: AirTight Networks ]

April 2008- In this presentation by AirTight Networks, various forms of wireless security issues are addressed. Topics include WiFi threats, wireless breaches, 802.11n and others.

802.11n Drives an Architectural Evolution [ Source: HP ]

January 2009- Enter the state-of-the-art WLAN—802.11n. Organizations can expand their wireless capabilities with this expanding technology to dramatically boost network capacity and speed—up to 600 Mbps. There are major implications as to how organizations will use and implement wireless networks moving forward.

Eleven Myths about 802.11 Wi-Fi Networks [ Source: Global Knowledge ]

August 2006- It seems that Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. This paper dispels 11 of the more common myths and provides accurate information that you can use to make your wireless network more secure, scalable, and ...

Simple Tricks To Ace the Subnetting Portion of Any Certification Exam [ Source: Global Knowledge ]

November 2006- Subnetting seems to be a battle of fighting bits, decimal numbers, and countless methods and processes to convert from one to the other. While the methods may be confusing, the mathematics behind them is the same for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions that you will find on the industry certification tests.

Your Intellectual Property Deserves Iron-Clad Security from Your Outsourcer [ Source: Long Circle ]

May 2008- IP-based businesses now represent the largest single sector of the U.S. economy and, according to the U.S. Commerce Department, intellectual property theft costs U.S. businesses an estimated $250 billion per year and 750,000 American jobs. An outsourcer is not only tasked with R&D development, but equally important, is expected to keep that intellectual property safe. No company can afford to do business with an outsourcing vendor that bypasses or takes shortcuts with security. ...

AT Command Set - M1HS, N501HS, H600 [ Source: acer ]

January 2008- This document discusses, in detail, the AT commands that are implemented in ONDA M1HS, N501HS, H600 UMTS/GPRS wireless card. All the AT commands follow 3GPP (R99) TS27.005 and TS27.007.

The Main Benefits Of Applying IEEE802.11e In Access Networks With Possible Roaming Users [ Source: Telenor ]

January 2008- This paper published by Telenor addresses some of the potential benefits IEEE 802.11e may have (compared to legacy IEEE 802.11) when deploying WLAN as an open access network that may also be applied for roaming users, like e.g. the concept studied in the IST OBAN project. The main intension is to try to quantify the benefits of applying the features of the IEEE 802.11e when it comes to the possibility of differentiation among user classes ...

Beacon-Stuffing: Wi-Fi Without Associations [ Source: Microsoft ]

January 2008- This paper showcases beacon-stuffing, a low bandwidth communication protocol for IEEE 802.11 networks that enables APs to communicate with clients without association. This enables clients to receive information from nearby APs even when they are disconnected, or when connected to another AP. The beacon-stuffing protocol is based on two key observations. APs embed content in Beacon and Probe Response frames, while clients overload Probe Requests to send data. Beacon-stuffing on various wireless cards on Windows XP ...

Wireless Technologies and e-Learning: Bridging the Digital Divide [ Source: Intel ]

January 2008- Information and Communications Technology (ICT) and e-Learning platforms extend the reach of education to broader audiences and provide ways to enhance traditional education, generating significant social and economic benefits to populations who have access to them. It provides alternative channels for improving the quality of education and extending its reach to broader audiences. A significant challenge in realizing the full promise of ICT worldwide has been lack of access, particularly in developing countries and in ...

Adaptive CSMA for Scalable Network Capacity in High-Density WLANs [ Source: Intel ]

January 2008- Demand for mobile computing devices is unlikely to ebb any time soon. As individuals and businesses continue to use more throughput-hungry applications, HD-WLAN designers will need to devise ways to improve network capacity by maximizing special reuse of channels. Tests by Intel researchers show that adaptation of RS and CCA could help minimize the interference problems experienced in traditional HD-WLAN?s. Researchers observed a throughput increase of up to 300 percent when using the new adaptation ...

Experimental Evaluation of Application Performance With 802.11 PHY Rate Adaptation Mechanisms in Diverse Environments [ Source: University of California ]

January 2008- Wireless LAN (WLAN) technology based on IEEE 802.11 standard is being commonly used in offices and hotspots for indoor wireless Internet access. The success of 802.11 technology has led to newer usage scenarios, including community mesh networks and multimedia distribution/data networking in the home. The application performance with different rate adaptation mechanisms is dependent on the specific tradeoffs these mechanisms make at the link layer in an application-oblivious manner between improving throughput and limiting frame loss. ...

Is IEEE 802.11 Ready for VoIP? [ Source: Microsoft ]

January 2008- In this white paper, Microsoft empirically explores voice communication over IEEE 802.11 networks (VoWiFi). The objective is to understand the limitations of the current WiFi network for VoWiFi deployment. The experiment finds two major problems of VoWiFi: unstable and excessively long handoffs and unpredictable occurrence of bursts. Several other minor factors that could hinder VoWiFi deployment are also discussed, such as network capacity, fairness, and interference susceptibility. Finally, the scenarios where VoWiFi could be used are ...

Next 25