Mobility

Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.

  • White Papers // Feb 2006

    How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity

    To create a wireless network that will meet your capacity and quality of service (QoS) expectations, you must consider the three "C's" of wireless network design:

    • The Context of the wireless network location
    • The wireless signal Coverage
    • The network's required Capacity (based on the number of users and the...

      Provided By Motorola

    • White Papers // Jan 2006

      Proportional Replication in Peer-to-Peer Networks

      The authors recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. In this paper they complement those results to show that this distribution has network-wide advantages as well. Given these benefits of proportional...

      Provided By

    • White Papers // Nov 2005

      Choosing a Monitoring System for Your IT Infrastructure?: What Should Your Key Considerations Be?

      Many organizations take months assessing different monitoring software and yet find it difficult to differentiate between these products, since most use the same jargon. Proactive monitoring, root-cause analysis, service-oriented user views, customizable reports, auto-correction, event correlation, etc. Are buzz words that most vendors use to describe their products. This paper...

      Provided By eG Innovations

    • White Papers // Nov 2005

      Machine-to-Machine (M2M) Communication Over GPRS Networks

      Wireless Packet Data networks, such as GPRS, hold great promise for applications that rely on machine to machine (M2M) communication. Widespread availability and low price per Kilobyte are two key benefits of GPRS networks that make it an attractive technology to replace existing equipment or to deploy new wireless solutions....

      Provided By Setrix

    • White Papers // Sep 2005

      Understanding the Choices: IMS Connect and WebSphere MQ

      Access to IMS transactions and data can be accomplished using a variety of mechanisms that are available in today's environment. The answer to the question of which solution is best suited to an application, however, depends on the requirements that have been specifically identified for that application. This paper addresses...

      Provided By IBM

    • White Papers // Aug 2005

      Disaster Recovery Time Objectives: Meeting Your Business Requirements

      If you are an IT disaster recovery manager, you most likely have disaster recovery plans in place that provide for recovery of critical business applications and the systems to support those applications. What processes and criteria were used to determine the recovery time objectives (RTO ? the time to recover...

      Provided By Sun Microsystems

    • White Papers // Jun 2005

      Problem Management - Key Best Practices

      The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...

      Provided By NetworkD

    • White Papers // Jun 2005

      Overview of Agile Management & Development Methods

      This paper presents an overview of Agile Project Management & Development Methods. The paper will describe the deficiency of normal project development processes, who started Agile Management & development method, what is it made up of and who should use it, differences between Agile development processes and normal development processes,...

      Provided By Project Perfect

    • White Papers // Jun 2005

      Offshore Project Management - Risks and Best Practices

      Outsourcing and offshoring have been the biggest trends of the last decade in IT. As more and more companies take advantage of the overwhelming benefits of reduced costs and increased flexibility, the trend toward offshore work is likely to continue. Companies have been evolving and refining their Project Management processes...

      Provided By Zinnov

    • White Papers // Apr 2005

      Using Computer Forensics When Investigating System Attacks

      This paper explains how to conduct a computer forensic investigation of a system in response to the suspicion, or actual occurrence, of an attack on that system. It discusses computer forensic analysis at different levels and provides information that is useful to a wide audience, including CIOs, DSOs, auditors, and...

      Provided By Sun Microsystems

    • Book chapters // Jan 2005

      Linux Server Security: System Log Management and Monitoring

      Whatever else the user does to secure a Linux system, it must have comprehensive, accurate, and carefully watched logs. Logs serve several purposes. First, they help to troubleshoot all kinds of system and application problems. Second, they provide valuable early warning signs of system abuse. Third, after all else fails...

      Provided By O'Reilly Media

    • White Papers // Dec 2004

      The New Wireless Network Setup Wizard in Windows XP Service Pack 2

      Wireless LAN technologies such as IEEE 802.11a/b/g have become a popular networking alternative to connect multiple computers in a home or small business. Although wireless networks introduce location flexibility, they also introduce security issues that do not exist with conventional wire-based networking technologies such as Ethernet. To make the configuration...

      Provided By Microsoft

    • White Papers // Jul 2004

      The 6 Steps to a Successful Enterprise System Implementation

      The process of implementing a new enterprise solution is incredibly complex. This process sends your organization down a long road of beneficial, although sometimes painful, change. Because of the sometimes overwhelming volumes of minute detail to be addressed during this process, it is all too easy to lose sight of...

      Provided By Relevant Business Systems

    • White Papers // Jul 2004

      IP Multimedia Subsystem: IMS - Overview and Applications

      This white paper presents an overview of the IP Multimedia Subsystem (IMS), provides examples of various services that this new environment can offer to end users, and outlines the benefits of IMS as a service delivery environment. The goal is to explain why operators should purchase and deploy such a...

      Provided By 3G Americas

    • White Papers // Jun 2004

      Use Case Scenarios

      The Digital Living Network Alliance (DLNA) is working to turn its vision of interoperable networked devices in the home into reality. More than 100 member companies are committed to providing seamless interaction between consumer electronics (CE), mobile technology and personal computers (PC). The DLNA believes this is best accomplished through...

      Provided By Digital Living Network Alliance

    • White Papers // Mar 2004

      Framework for ICT Technical Support

      ITIL is derived from the collective experiences of ICT technical support providers all over the UK. It represents their learning curve over the last 20 years and has been distilled into a set of common processes applicable to any establishment using ICT. The emphasis of FITS is on proactive tasks...

      Provided By British Educational Communications and Technology Agency

    • Related Offers // Feb 2004

      Ready to try out Exchange server 2003 today?

      The Exchange 2003 trial software program is designed to give you an opportunity to try the new and enhanced features for 120 days.

      Provided By Microsoft

    • Related Offers // Feb 2004

      Office Professional 2003 Evaluation Kit

      Microsoft? Office Professional 2003 provides familiar, easy-to-use applications for document authoring, analysis, information gathering, presentation, and communication. Simplify the use of information into business processes, dramatically improve e-mail and calendar use, integrate collaboration into the way your employees work, and enable the protection and control of sensitive business information.

      ...

      Provided By Microsoft

    • White Papers // Feb 2004

      Broadband MIMO-OFDM Wireless Communications

      Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a multiple-input multiple-output (MIMO) configuration....

      Provided By Georgia Institute of Technology

    • Related Offers (non-promo) // Feb 2004

      Making Secure Mobility Possible for the Enterprise Network

      This paper highlights why enterprises need more secure mobility solutions, what the challenges are today and how HP ProCurve Networking is consistently delivering successful solutions that provide security, flexibility, and reliable functionality that enterprises seek

      Provided By Hewlett-Packard (HP)

    • Downloads // Jan 2004

      Nokia Developer's Suite for MMS Version 1.1 Nokia Developer's Suite for MMS Version 1.1

      The Nokia Developer's Suite for MMS is a tool, which assembles an MMS message based on an existing SMIL file, its referenced media files, and the required MMS message headers. This MMS message can be sent to one or many handset simulator SDK(s) as well as to the Nokia MMSC...

      Provided By Nokia

    • White Papers // Dec 2003

      Hierarchical Disparity Estimation With Programmable 3D Hardware

      This paper presents an implementation of a hierarchical disparity estimation algorithm entirely executed on programmable 3D graphics hardware. Since programmable 3D graphics hardware has increased its algorithmic and computational power, several research teams exploit the SIMD (single instruction, multiple data) facilities of 3D graphic processing unit (GPU) to accelerate applications...

      Provided By

    • White Papers // Nov 2003

      Video Streaming Over Bluetooth: A Survey

      In recent years, wireless ad hoc networks have been a growing area of research. The advent of Bluetooth wireless technology makes it possible to transmit real-time video/audio in mobile and pervasive environments. In comparison with the other wireless standard such as 802.11x and IrDA, Bluetooth is more cost-efficient and power-efficient,...

      Provided By Institute for Infocomm Research

    • White Papers // Jul 2003

      Wireless Data Transmission over GSM Short Message Service (GSM-SMS)

      This is a white paper on the efforts of EACOMM Corporation Embedded Systems Division, in Developing Wireless Data Transmission Systems utilizing existing Wireless Telecommunications Infrastructure.

      Provided By EACOMM

    • White Papers // May 2003

      GPRS Security Threats and Solution Recommendations

      This paper is intended to assist General Packet Radio Service operators and network designers in the evaluation of potential security threats and solutions. Although a brief review of GPRS architecture is provided, it is assumed that the reader understands the basic GPRS architecture and Internet Protocol data networking. This paper...

      Provided By NetScreen Technologies

    • White Papers // Apr 2003

      Log Files Vs. Data Tagging

      This paper discusses the merits of log files relative to data tags, flagging a number of important areas where data tags solve problems encountered with log files. The paper also explores issue of data accuracy and data storage and handling. Accuracy is of paramount concern when dealing with data collection...

      Provided By

    • White Papers // Apr 2003

      Mobile E-Commerce and Location-Based Services: Technology and Requirements

      Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. This paper views M-Commerce as activity of conducting E-commerce transactions using mobile terminals over a wireless network. A special case of M-commerce are Location Based Services...

      Provided By University of Athens

    • White Papers // Mar 2003

      Centrino vs. Pentium M: The Battle for Wireless Notebooks

      This paper compares the two brands Pentium M and Centrino which both use the identical microprocessors and explains how wireless functionality is the primary difference between the two. In addition, this paper provides a perspective on how Pentium M notebooks can offer even longer battery-life, as well as faster, more...

      Provided By Atheros Communications

    • White Papers // Mar 2003

      EDGE- Introduction of High Speed Data in GSM/GPRS Networks

      This white paper is intended for global system for mobile communications (GSM) operators interested in understanding Ericsson's view on how enhanced data for global evolution (EDGE) can play an important role in the evolution toward wideband code division multiple access (WCDMA).

      Provided By Ericsson

    • White Papers // Oct 2002

      Binary Runtime Environment for Wireless - Creating a BREW Application from Scratch

      This paper walks user through the basic steps necessary to create first Binary Runtime Environment for Wireless (BREW) application using the tools provided in the BREW Software Development Kit (BREW SDK). It also provides an overview of the BREW application development process, so one can understand how each step in...

      Provided By QUALCOMM

    • White Papers // Sep 2002

      Video Streaming: Concepts, Algorithms, and Systems

      Video has been an important media for communications and entertainment for many decades. This paper examines the challenges that make simultaneous delivery and playback, or streaming, of video difficult, and explores algorithms and systems that enable streaming of pre-encoded or live video over packet networks such as the Internet. This...

      Provided By Hewlett-Packard (HP)

    • White Papers // Jun 2002

      Understanding Packet Voice Protocols

      This paper provides an understanding of packet voice protocols, and clarifies some confusion and myths that surround all of the protocols.

      Provided By Cisco Systems

    • White Papers // Feb 2002

      FER, RXQUAL, and DTX DL Rate Measurements in TEMS Investigation GSM

      This document describes the information elements FER, RXQUAL, and DTX DL rate presented in TEMS Investigation GSM. It is applicable to all GSM version of TEMS Investigation and to all TEMS mobile GSM phones. It covers speech measurements only, data measurements are not included.

      Provided By Ericsson

    • White Papers // May 2001

      Design and Simulation of Orthogonal Frequency Division Multiplexing (OFDM) Signaling

      A MATLAB program has been written to investigate Orthogonal Frequency Division Multiplexing (OFDM) communication systems. This program is valuable for future researchers simulating systems that are too theoretically complex to analyze. Single carrier QAM and multicarrier OFDM are compared to demonstrate the strength of OFDM in multipath channels. Two graphical...

      Provided By Bradley University

    • White Papers // Mar 2001

      Wireless Home Networks - DECT, Bluetooth, HomeRF, and Wireless LANs

      A wireless home network is an intriguing alternative to phone line and power line wiring systems. Wireless home networks provide all the functionality of wireline networks without the physical constraints of the wire itself. They generally revolve around either IR or radio transmissions within your home. Radio transmissions comprise of...

      Provided By Xilinx

    • White Papers // Mar 2001

      How NAT Works

      Basically, Network Address Translation allows a single device, such as a router, to act as agent between the Internet (or public network) and a local (or private) network. This means that only a single unique IP address is required to represent an entire group of computers to anything outside their...

      Provided By Cisco Systems

    • Case Studies // Jan 2000

      E-commerce Site Evaluation: a Case Study

      Recent surveys on e-commerce sites confirm the increased use of the Web for shopping. The reasons of these trends have been attributed to different factors such as convenience, saving time, absence of sales pressure, safety, among others. However, an essential site characteristic that should also be taken into account is...

      Provided By World Wide Web Conference

    • News // Jul 1999

      Voice-over-Data Network Gear Ahead of Business Demand

      Every major networking firm is rushing to bring voice capabilities to its Internet-based data equipment, but most businesses say they're leery of installing the technology in their local area networks, a new study shows. The integration of voice capabilities into data gear based on Internet protocol (IP) is expected to...

      Provided By CNET Networks