December 2012- Many retailers are having a hard time breaking out of the economy's current stagnation. Store optimization that goes beyond a building's four walls to take into account consumers' access to information, preferences for communication, and multi-channel purchasing methods can help retailers attract more customers and make the most of the customers they already have.
Medical care in the United States suffers from problems related to cost, quality, and
fragmented delivery, and compliance to new models and reforms. What's needed,
instead, is an approach to health care that is proactive, integrated, and patient-centric.
New strategies are evolving to propel health care in those directions. A new technology solution, known as integrated care management, is emerging to address the important processes and functions of those strategies.
March 2012- A BYOD solution should automate the device onboarding process for employees and guests, as well as the administration and enforcement of policies, by gathering information about the context of the device, user and connection. BYOD also requires real-time visibility and reporting to quickly measure, enforce, and meet compliance mandates.
March 2012- Long derided as an overhyped concept, network access control (NAC) has emerged as an important solution for mitigating the risks of consumerization. Network and security managers will use NAC to retain control of the network in a "bring your own device" (BYOD) environment.
March 2010- Unified networking is now firmly established as one of the key directions for LAN deployments going forward. As is the case with the improvement in visibility and strategic direction resulting from the ratification of the 802.11n standard,there is little question today regarding the viability of the unified approach, nor with the system vendors’ ability to field product lines implementing the concept. Learn about the benefits of unified networks in this whitepaper from Farpoint Group. ...
March 2009- The crucial interoperability of wireless network devices built around the 802.11 standard is threatened by the advent of new and faster technologies. The IEEE is trying to cope by introducing the 802.11n standard--but it’s still in draft form. Meanwhile, how can manufacturers cope with the confusion and promise surrounding 802.11’s future? The situation is outlined, and a forward path, based on strategic testing, is proposed.
August 2009- Real-time locating systems (RTLS) are becoming mainstream in healthcare environments. Although currently there is only a 29% adoption rate, this number is expected to grow to nearly 70% by 2011. However, there are many different RTLS offerings as well as remarkable variation in the implementation processes, functionality, and long-term success with each system. This white paper explores the implementation costs between two popular RTLS solutions: Wi-Fi RFID (radio frequency identification) from Cisco and hardwired Infrared-RFID from Versus, and ...
June 2008- Driven by the demand for “green” technology and better use of power, a new generation of extreme low-power wireless networks is being developed for use in machine to machine networks, for industrial and control applications, as well as for health, security, and other purposes. This article is about this new approach to truly wireless networks –- without any network cables or power lines.
April 2009- Today’s Web applications, IP video streams, VoIP systems, and mobile devices are placing more and more demand on wireless networks. This white paper explores 802.11n technology and applications, while offering business leaders a solid educational foundation for making wireless deployment and purchasing decisions.
November 2008- NetForecast explores voice and video network issues, IP telephony challenges, network immunity benefits and more in this presentation on upgrading your data network. This presentation includes information on the key components for establishing an effective network architecture to support remote users.
November 2008- Michael F. Finneran, Principal, dBrn Associates, discusses802.11, WLANs, WiFi, WLAN switching options, security, WEP, and more in this recent presentation.
May 2008- The growth of mobility, extension of the enterprise, and business expectations for instant gratification are leading to Unified Communication, federated connectivity, and automated provisioning of end-to-end services. KPMG takes a look at challenges and solutions ahead in this presentation.
April 2008- What does network convergence mean for IT? Cisco takes a look at physical security and IT in this presentation.
April 2008- In this presentation by AirTight Networks, various forms of wireless security issues are addressed. Topics include WiFi threats, wireless breaches, 802.11n and others.
January 2009- Enter the state-of-the-art WLAN—802.11n. Organizations can expand their wireless capabilities with this expanding technology to dramatically boost network capacity and speed—up to 600 Mbps. There are major implications as to how organizations will use and implement wireless networks moving forward.
August 2006- It seems that Wi-Fi networks have been misunderstood by much of the IT community since their inception. Even the reasons for this misunderstanding are kind of hard to understand. The result has been that myths about 802.11 (better known as Wi-Fi) networks have grown almost as fast as the technology itself. This paper dispels 11 of the more common myths and provides accurate information that you can use to make your wireless network more secure, scalable, and ...
November 2006- Subnetting seems to be a battle of fighting bits, decimal numbers, and countless methods and processes to convert from one to the other. While the methods may be confusing, the mathematics behind them is the same for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions that you will find on the industry certification tests.
May 2008- IP-based businesses now represent the largest single sector of the U.S. economy and, according to the U.S. Commerce Department, intellectual property theft costs U.S. businesses an estimated $250 billion per year and 750,000 American jobs. An outsourcer is not only tasked with R&D development, but equally important, is expected to keep that intellectual property safe. No company can afford to do business with an outsourcing vendor that bypasses or takes shortcuts with security. ...
January 2008- This document discusses, in detail, the AT commands that are implemented in ONDA M1HS, N501HS, H600 UMTS/GPRS wireless card. All the AT commands follow 3GPP (R99) TS27.005 and TS27.007.
January 2008- This paper published by Telenor addresses some of the potential benefits IEEE 802.11e may have (compared to legacy IEEE 802.11) when deploying WLAN as an open access network that may also be applied for roaming users, like e.g. the concept studied in the IST OBAN project. The main intension is to try to quantify the benefits of applying the features of the IEEE 802.11e when it comes to the possibility of differentiation among user classes ...
January 2008- This paper showcases beacon-stuffing, a low bandwidth communication protocol for IEEE 802.11 networks that enables APs to communicate with clients without association. This enables clients to receive information from nearby APs even when they are disconnected, or when connected to another AP. The beacon-stuffing protocol is based on two key observations. APs embed content in Beacon and Probe Response frames, while clients overload Probe Requests to send data. Beacon-stuffing on various wireless cards on Windows XP ...
January 2008- Information and Communications Technology (ICT) and e-Learning platforms extend the reach of education to broader audiences and provide ways to enhance traditional education, generating significant social and economic benefits to populations who have access to them. It provides alternative channels for improving the quality of education and extending its reach to broader audiences. A significant challenge in realizing the full promise of ICT worldwide has been lack of access, particularly in developing countries and in ...
January 2008- Demand for mobile computing devices is unlikely to ebb any time soon. As individuals and businesses continue to use more throughput-hungry applications, HD-WLAN designers will need to devise ways to improve network capacity by maximizing special reuse of channels. Tests by Intel researchers show that adaptation of RS and CCA could help minimize the interference problems experienced in traditional HD-WLAN?s. Researchers observed a throughput increase of up to 300 percent when using the new adaptation ...
January 2008- Wireless LAN (WLAN) technology based on IEEE 802.11 standard is being commonly used in offices and hotspots for indoor wireless Internet access. The success of 802.11 technology has led to newer usage scenarios, including community mesh networks and multimedia distribution/data networking in the home. The application performance with different rate adaptation mechanisms is dependent on the specific tradeoffs these mechanisms make at the link layer in an application-oblivious manner between improving throughput and limiting frame loss. ...
January 2008- In this white paper, Microsoft empirically explores voice communication over IEEE 802.11 networks (VoWiFi). The objective is to understand the limitations of the current WiFi network for VoWiFi deployment. The experiment finds two major problems of VoWiFi: unstable and excessively long handoffs and unpredictable occurrence of bursts. Several other minor factors that could hinder VoWiFi deployment are also discussed, such as network capacity, fairness, and interference susceptibility. Finally, the scenarios where VoWiFi could be used are ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services