Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity
To create a wireless network that will meet your capacity and quality of service (QoS) expectations, you must consider the three "C's" of wireless network design:
- The Context of the wireless network location
- The wireless signal Coverage
- The network's required Capacity (based on the number of users and the...
Provided By Motorola
-
Proportional Replication in Peer-to-Peer Networks
The authors recently showed for peer-to-peer networks, that having the number of replicas of each object proportional to the request rate for these objects has many per-node advantages. In this paper they complement those results to show that this distribution has network-wide advantages as well. Given these benefits of proportional...
-
Choosing a Monitoring System for Your IT Infrastructure?: What Should Your Key Considerations Be?
Many organizations take months assessing different monitoring software and yet find it difficult to differentiate between these products, since most use the same jargon. Proactive monitoring, root-cause analysis, service-oriented user views, customizable reports, auto-correction, event correlation, etc. Are buzz words that most vendors use to describe their products. This paper...
Provided By eG Innovations
-
Machine-to-Machine (M2M) Communication Over GPRS Networks
Wireless Packet Data networks, such as GPRS, hold great promise for applications that rely on machine to machine (M2M) communication. Widespread availability and low price per Kilobyte are two key benefits of GPRS networks that make it an attractive technology to replace existing equipment or to deploy new wireless solutions....
Provided By Setrix
-
Understanding the Choices: IMS Connect and WebSphere MQ
Access to IMS transactions and data can be accomplished using a variety of mechanisms that are available in today's environment. The answer to the question of which solution is best suited to an application, however, depends on the requirements that have been specifically identified for that application. This paper addresses...
Provided By IBM
-
Disaster Recovery Time Objectives: Meeting Your Business Requirements
If you are an IT disaster recovery manager, you most likely have disaster recovery plans in place that provide for recovery of critical business applications and the systems to support those applications. What processes and criteria were used to determine the recovery time objectives (RTO ? the time to recover...
Provided By Sun Microsystems
-
Problem Management - Key Best Practices
The ITIL framework supplies an excellent relational model on how to manage Incidents, Problems and Changes. But this model becomes much more powerful when best practices are applied; such as planning and documenting Roles and Responsibilities, proper Operational Metrics and defined processes for Knowledge Management, Root Cause Analysis, ROI Calculation...
Provided By NetworkD
-
Overview of Agile Management & Development Methods
This paper presents an overview of Agile Project Management & Development Methods. The paper will describe the deficiency of normal project development processes, who started Agile Management & development method, what is it made up of and who should use it, differences between Agile development processes and normal development processes,...
Provided By Project Perfect
-
Offshore Project Management - Risks and Best Practices
Outsourcing and offshoring have been the biggest trends of the last decade in IT. As more and more companies take advantage of the overwhelming benefits of reduced costs and increased flexibility, the trend toward offshore work is likely to continue. Companies have been evolving and refining their Project Management processes...
Provided By Zinnov
-
Using Computer Forensics When Investigating System Attacks
This paper explains how to conduct a computer forensic investigation of a system in response to the suspicion, or actual occurrence, of an attack on that system. It discusses computer forensic analysis at different levels and provides information that is useful to a wide audience, including CIOs, DSOs, auditors, and...
Provided By Sun Microsystems
-
Linux Server Security: System Log Management and Monitoring
Whatever else the user does to secure a Linux system, it must have comprehensive, accurate, and carefully watched logs. Logs serve several purposes. First, they help to troubleshoot all kinds of system and application problems. Second, they provide valuable early warning signs of system abuse. Third, after all else fails...
Provided By O'Reilly Media
-
The New Wireless Network Setup Wizard in Windows XP Service Pack 2
Wireless LAN technologies such as IEEE 802.11a/b/g have become a popular networking alternative to connect multiple computers in a home or small business. Although wireless networks introduce location flexibility, they also introduce security issues that do not exist with conventional wire-based networking technologies such as Ethernet. To make the configuration...
Provided By Microsoft
-
The 6 Steps to a Successful Enterprise System Implementation
The process of implementing a new enterprise solution is incredibly complex. This process sends your organization down a long road of beneficial, although sometimes painful, change. Because of the sometimes overwhelming volumes of minute detail to be addressed during this process, it is all too easy to lose sight of...
Provided By Relevant Business Systems
-
IP Multimedia Subsystem: IMS - Overview and Applications
This white paper presents an overview of the IP Multimedia Subsystem (IMS), provides examples of various services that this new environment can offer to end users, and outlines the benefits of IMS as a service delivery environment. The goal is to explain why operators should purchase and deploy such a...
Provided By 3G Americas
-
Use Case Scenarios
The Digital Living Network Alliance (DLNA) is working to turn its vision of interoperable networked devices in the home into reality. More than 100 member companies are committed to providing seamless interaction between consumer electronics (CE), mobile technology and personal computers (PC). The DLNA believes this is best accomplished through...
Provided By Digital Living Network Alliance
-
Framework for ICT Technical Support
ITIL is derived from the collective experiences of ICT technical support providers all over the UK. It represents their learning curve over the last 20 years and has been distilled into a set of common processes applicable to any establishment using ICT. The emphasis of FITS is on proactive tasks...
Provided By British Educational Communications and Technology Agency
-
Ready to try out Exchange server 2003 today?
The Exchange 2003 trial software program is designed to give you an opportunity to try the new and enhanced features for 120 days.
Provided By Microsoft
-
Office Professional 2003 Evaluation Kit
Microsoft? Office Professional 2003 provides familiar, easy-to-use applications for document authoring, analysis, information gathering, presentation, and communication. Simplify the use of information into business processes, dramatically improve e-mail and calendar use, integrate collaboration into the way your employees work, and enable the protection and control of sensitive business information.
...Provided By Microsoft
-
Broadband MIMO-OFDM Wireless Communications
Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a multiple-input multiple-output (MIMO) configuration....
Provided By Georgia Institute of Technology
-
Making Secure Mobility Possible for the Enterprise Network
This paper highlights why enterprises need more secure mobility solutions, what the challenges are today and how HP ProCurve Networking is consistently delivering successful solutions that provide security, flexibility, and reliable functionality that enterprises seek
Provided By Hewlett-Packard (HP)
-
Nokia Developer's Suite for MMS Version 1.1 Nokia Developer's Suite for MMS Version 1.1
The Nokia Developer's Suite for MMS is a tool, which assembles an MMS message based on an existing SMIL file, its referenced media files, and the required MMS message headers. This MMS message can be sent to one or many handset simulator SDK(s) as well as to the Nokia MMSC...
Provided By Nokia
-
Hierarchical Disparity Estimation With Programmable 3D Hardware
This paper presents an implementation of a hierarchical disparity estimation algorithm entirely executed on programmable 3D graphics hardware. Since programmable 3D graphics hardware has increased its algorithmic and computational power, several research teams exploit the SIMD (single instruction, multiple data) facilities of 3D graphic processing unit (GPU) to accelerate applications...
-
Video Streaming Over Bluetooth: A Survey
In recent years, wireless ad hoc networks have been a growing area of research. The advent of Bluetooth wireless technology makes it possible to transmit real-time video/audio in mobile and pervasive environments. In comparison with the other wireless standard such as 802.11x and IrDA, Bluetooth is more cost-efficient and power-efficient,...
Provided By Institute for Infocomm Research
-
Wireless Data Transmission over GSM Short Message Service (GSM-SMS)
This is a white paper on the efforts of EACOMM Corporation Embedded Systems Division, in Developing Wireless Data Transmission Systems utilizing existing Wireless Telecommunications Infrastructure.
Provided By EACOMM
-
GPRS Security Threats and Solution Recommendations
This paper is intended to assist General Packet Radio Service operators and network designers in the evaluation of potential security threats and solutions. Although a brief review of GPRS architecture is provided, it is assumed that the reader understands the basic GPRS architecture and Internet Protocol data networking. This paper...
Provided By NetScreen Technologies
-
Log Files Vs. Data Tagging
This paper discusses the merits of log files relative to data tags, flagging a number of important areas where data tags solve problems encountered with log files. The paper also explores issue of data accuracy and data storage and handling. Accuracy is of paramount concern when dealing with data collection...
-
Mobile E-Commerce and Location-Based Services: Technology and Requirements
Advances in Internet and network technology and the rapidly growing number of mobile personal devices result in the fast growth of Mobile E-Commerce, M-Commerce. This paper views M-Commerce as activity of conducting E-commerce transactions using mobile terminals over a wireless network. A special case of M-commerce are Location Based Services...
Provided By University of Athens
-
Centrino vs. Pentium M: The Battle for Wireless Notebooks
This paper compares the two brands Pentium M and Centrino which both use the identical microprocessors and explains how wireless functionality is the primary difference between the two. In addition, this paper provides a perspective on how Pentium M notebooks can offer even longer battery-life, as well as faster, more...
Provided By Atheros Communications
-
EDGE- Introduction of High Speed Data in GSM/GPRS Networks
This white paper is intended for global system for mobile communications (GSM) operators interested in understanding Ericsson's view on how enhanced data for global evolution (EDGE) can play an important role in the evolution toward wideband code division multiple access (WCDMA).
Provided By Ericsson
-
Binary Runtime Environment for Wireless - Creating a BREW Application from Scratch
This paper walks user through the basic steps necessary to create first Binary Runtime Environment for Wireless (BREW) application using the tools provided in the BREW Software Development Kit (BREW SDK). It also provides an overview of the BREW application development process, so one can understand how each step in...
Provided By QUALCOMM
-
Video Streaming: Concepts, Algorithms, and Systems
Video has been an important media for communications and entertainment for many decades. This paper examines the challenges that make simultaneous delivery and playback, or streaming, of video difficult, and explores algorithms and systems that enable streaming of pre-encoded or live video over packet networks such as the Internet. This...
Provided By Hewlett-Packard (HP)
-
Understanding Packet Voice Protocols
This paper provides an understanding of packet voice protocols, and clarifies some confusion and myths that surround all of the protocols.
Provided By Cisco Systems
-
FER, RXQUAL, and DTX DL Rate Measurements in TEMS Investigation GSM
This document describes the information elements FER, RXQUAL, and DTX DL rate presented in TEMS Investigation GSM. It is applicable to all GSM version of TEMS Investigation and to all TEMS mobile GSM phones. It covers speech measurements only, data measurements are not included.
Provided By Ericsson
-
Design and Simulation of Orthogonal Frequency Division Multiplexing (OFDM) Signaling
A MATLAB program has been written to investigate Orthogonal Frequency Division Multiplexing (OFDM) communication systems. This program is valuable for future researchers simulating systems that are too theoretically complex to analyze. Single carrier QAM and multicarrier OFDM are compared to demonstrate the strength of OFDM in multipath channels. Two graphical...
Provided By Bradley University
-
Wireless Home Networks - DECT, Bluetooth, HomeRF, and Wireless LANs
A wireless home network is an intriguing alternative to phone line and power line wiring systems. Wireless home networks provide all the functionality of wireline networks without the physical constraints of the wire itself. They generally revolve around either IR or radio transmissions within your home. Radio transmissions comprise of...
Provided By Xilinx
-
How NAT Works
Basically, Network Address Translation allows a single device, such as a router, to act as agent between the Internet (or public network) and a local (or private) network. This means that only a single unique IP address is required to represent an entire group of computers to anything outside their...
Provided By Cisco Systems
-
E-commerce Site Evaluation: a Case Study
Recent surveys on e-commerce sites confirm the increased use of the Web for shopping. The reasons of these trends have been attributed to different factors such as convenience, saving time, absence of sales pressure, safety, among others. However, an essential site characteristic that should also be taken into account is...
Provided By World Wide Web Conference
-
Voice-over-Data Network Gear Ahead of Business Demand
Every major networking firm is rushing to bring voice capabilities to its Internet-based data equipment, but most businesses say they're leery of installing the technology in their local area networks, a new study shows. The integration of voice capabilities into data gear based on Internet protocol (IP) is expected to...
Provided By CNET Networks
-
KUTTIG Computeranwendungen GmbH Cuts Internal Enterprise Communication Expenses by 50%
KUTTIG Computeranwendungen wanted to create an enterprisewide collaboration and communications infrastructure, eliminating the existing numerous island solutions for communication and for storing information and harmonize platform in the different departments (currently heterogeneous and based on area-specific skills). The challenge was to establish uniform processes, reduce work involved in introducing new...
Provided By Oracle
-
Raad Voor de Kinderbescherming NL Better Protects Children With Case Management Solution
Raad voor de Kinderbescherming NL conducts its work from 22 locations. In the past, all regions used their own unique versions of systems and databases to handle the influx of data. Therefore, the information about children and their families was severely divided. Often, as a case moved from region to...
Provided By Oracle
-
Tbricks Delivers Blazingly Fast Strategy Trading Platform With Embedded Database
Tbricks mission is to provide trading professionals with the most user-friendly and efficient tools for executing automated trading strategies on the financial markets. The Tbricks engineering team required a database foundation for its Genesis trading platform that could endure the volume and stress presented by real-time market data, trade execution,...
Provided By Oracle
-
Goedis Optimizes Distribution and Delivery Processes With Data Encryption
Geodis Holding Italia wanted to improve the security and transparency of the parts delivery process and monitor and control deliveries in real time using latest generation technologies. The challenge was to implement a robust, dependable, easy-to-use system and implement a system capable of transparent integration with the company's Oracle-based information...
Provided By Oracle
-
Catawba County Implements New Financial System for Mental Health Partners in Just Three Months
Catawba County wanted to establish Mental Health Partners of Catawba county - a local management entity responsible for ensuring that the county has an adequate provider network. The challenge was to establish financial books - independent from the county - for Mental Health Partners and include data for a new...
Provided By Oracle
-
Toumaz Drives Digital Medicine Revolution With Intelligent, Low-Cost, Patient-Centric Body Monitoring
Toumaz wanted to develop zero-administration wireless device for intelligent, non-intrusive body monitoring that helps patients manage their chronic diseases and detect adverse events earlier and develop a highly reliable, secure, and scalable system for healthcare providers to manage their patients. The challenge was to ensure continuous transfer of physical and...
Provided By Oracle
-
ILJIN Diamond Cuts Costs, Achieves Integrated Enterprisewide Management
ILJIN Diamond is a leading manufacturer of industrial tools that utilize synthetic diamonds as precision cutting instruments. In 2007, ILJIN Diamond kicked off a project to streamline workflows and improve the way it responded to changes in the market. This required the company to adopt an integrated business management model,...
Provided By Oracle
-
From Apache Beehive to Oracle's Application Development Framework (Oracle ADF)
The BEA sponsored Apache Beehive framework has been around for a while but in recent years hasn't progressed much. This paper explains why Oracle's Application Development Framework is a natural step forward for organizations which are currently using Beehive and are looking for a new framework to update their solution....
Provided By Oracle
-
Aerofast Speedpak Encomendas Expressas Ltda. Accelerates Cargo Classification Process
Aerofast Speedpak Encomendas Expressas Ltda. wanted to accelerate process integration to streamline cargo and shipment deliveries to customers and providers and reduce time needed to process cargo transportation by eliminating the reclassification process, which had rendered the system unavailable in the early morning. The challenge was to accelerate deliveries by...
Provided By Oracle
-
Korea Housing Guarantee Company Limited Gains New Efficiency With Enterprise Portal
Korea Housing Guarantee Company Limited (KHGC) was established when the Republic of Korea introduced a preconstruction sales system and put in place a large amount of public housing. As KHGC's business steadily grew, its IT environment became very complicated. KHGC recognized the need to implement a single access point for...
Provided By Oracle
-
What Enterprises Need To Know About Mobile
Mobile is exploding - in 2014 more users will connect to the Internet over mobile devices than desktop PCs. This HP infographic looks at what enterprises need to know to address top current and future mobile issues.
Provided By Hewlett-Packard (HP)
-
A Lifecycle Approach To Delivering Mobile Applications
With the HP Mobile Application lifecycle, enterprise and service providers can develop IT strategy to prioritize their mobile opportunities, answer to the consumerization of the enterprise, and better serve their citizens and customers with new services.
Through the mobile application lifecycle, HP addresses all requirements of an enterprise with...Provided By Hewlett-Packard (HP)
-
Manage IT Services Efficiently: Serve Business Effectively.
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. The management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and...
Provided By Hewlett-Packard (HP)
-
5 Mobile Application Considerations That You Can Conquer
There is a remarkable transformation in how people access systems and information. Mobile devices are rapidly overtaking computers as the primary information consumption means. In a recent report, The Economist has projected a growth in the number of mobile devices to reach 10 billion by 2020 and the shipment of...
Provided By Hewlett-Packard (HP)
-
Mobilizing The Business Of IT
Mobility has permeated every department in every organization. Yet, enterprise mobility has not entirely equated to enterprise IT mobility. Enabling mobility in the workplace is a top-of-mind goal for decision makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies...
Provided By Hewlett-Packard (HP)
-
Six Solutions for What's Keeping Support Executives up at Night
The challenges of today's service and support environment just might be keeping you awake at night. The expectations are great and the daily demands relentless. But there's hope.
"By moving away from the current break/fix technical support model and providing a value-added customer experience, organizations can gain a significant...Provided By Citrix Online
-
The Power User's Guide To Successful Webinars
Webinars are powerful tools - especially when you know how to create, promote and deliver them like a power user.
Interactive online webinars have emerged as the gold standard in B2B marketing.
This new eBook provides webinar tips, tactics and techniques from some of the sharpest minds in...Provided By Citrix Online
-
The Secret Formula for Webinar Presentations that Work Every Time
Text-heavy slides and large photos bore your audience and bog down the presentation. It's time to redesign your slide deck with a few simple tricks.
One of the most important factors in your webinar's success is the work you put into designing your deck of slides.
This brief...Provided By Citrix Online
-
The Truth About Working From Anywhere
With great flexibility comes great responsibility. You need to know how to effectively wield the power of workplace mobility before it can be yours.
Get in the habit of structuring collaboration around action and outcomes.
This ProjectsAtWork brief, the final part in the Thought Leadership Series, delivers over...Provided By Citrix Online
-
Balancing Customer Intimacy with Self-Sufficiency
Self-service continues to rock the support world because it drastically frees up representatives' time and reduces expenses. But are there hidden costs of self-service? This white paper explores self-service's impact on the rest of the support organization and what you can do to better balance assisted support with self-service strategies.
Provided By Citrix Online
-
It's Time To Review ? And Renew ? Your Telecommuting Policy
There's no "one size fits all" when it comes to telecommuting.
This new Forrester white paper explores how implementing best practices to create a telecommuting program and standardized policy significantly reduces operational costs and increases employee productivity ? a winning combination in a tough economy.Provided By Citrix Online
-
Live Webcast: Money Talks - The Real Business Benefits of Effective Communication
Join us for this LIVE Event on:
Thursday, April 11, 2013
Time: 2:00 pm ET | 11:00 am PT
All too often, business suffers because communication is seen as a mere training or HR issue rather than what it is: the essential vehicle we use to turn ideas...Provided By Citrix Online
-
Smart Security Choices for Mobile Workers
Citrix Online recently conducted a comprehensive survey on the subject of remote access and security to find out how organizations are (or aren't) safeguarding critical information and systems when mobile workers head into the world armed with laptops.
Provided By Citrix Online
-
Bus, Bike, Car and Now Web: The Changing Face of Commuting
More workers than ever are performing at least part of their jobs outside the traditional office space. But instead of relying on telephones to maintain contact with the office, there is a new kind of remote worker: Web commuters. To get to the bottom of this growing trend, Citrix Online...
Provided By Citrix Online
-
The Business Case for Web Commuting
This new white paper explores the challenges to creating an infrastructure that supports remote workers, thus enabling an organization to accomplish its primary Web-commuting goals of reducing costs while elevating employee productivity.
Provided By Citrix Online
-
How to Deliver Webinars on a Budget
You don't need a corporate marketing department and thousands of dollars to put on effective Webinars.
View this on-demand Webinar to learn the basics of Webinar production for small businesses. Ken Molay, President of Webinar Success, will share how to prepare, produce, promote, and deliver marketing Webinars on a budget.Provided By Citrix Online
-
Freemium vs. Desktop Video Conferencing: The Value of Being Built for Business
Business-grade collaboration tools and mobile technologies have opened the door to a whole new way of working – both in and out of offices.
“For many people, work is becoming more about what they do than where they do it.”
This brief explores the productivity value of video...Provided By Citrix Online
-
Workshifting Benefits: The Bottom Line
This new white paper from the Telework Research Network provides a quantitative synthesis of the potential benefits that regular telecommuting can offer companies, employees and communities.
Provided By Citrix Online
-
Improving the Productivity of Virtual Employees: How GoToMeeting Corporate helps you manage a remote team
By 2011, IDC expects mobile workers to make up 73 percent of the total U.S. workforce. Whether mobile employees are out in the field or at home, sitting in a satellite office or constantly on the go within a corporate campus environment, they're going to need an effective way to...
Provided By Citrix Online
-
Working Smarter and Getting Better Marketing ROI in 2011: How Webinars Generate the Greatest Return
Webinars have leveled the marketing playing field. Today's SMBs can seriously compete with large companies in market reach and thought leadership, while generating a significant ROI.
This new white paper explores how to effectively use webinars to generate leads, nurture client relationships and close more sales.Provided By Citrix Online
-
Engage! How to Avoid the Seven Sins of Live, Online Presentations
Webinars have become a common business practice. They reduce travel time and costs, increase geographic reach and enable greater efficiency. But to maximize the benefits, you've got to engage attendees. This new 1080 Group white paper explores the 7 critical mistakes made when presenting online and how to avoid them....
Provided By Citrix Online
-
How to Create and Run a Winning Webinar Series eGuide
A successful marketing Webinar series can educate your prospects on your company's uniqueness, create a competitive advantage, dramatically increase lead flow, and drive sales.""
This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.Provided By Citrix Online
-
Managing People You Can't See
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Provided By Citrix Online
-
Webinar: Make Customer Experience a Cornerstone of Your Revenue Strategy
Watch this Webinar to hear Jeffery Tarter, Executive Director of the Association of Support Professionals (ASP), discuss the major industry shift from break-fix support to strategic customer advocacy and best practices for generating reocurring support and service revenue.
He is joined by Robert Bell, Services Management Consultant, who shares...Provided By Citrix Online
-
How Audio Conferencing Usage is Changing and Why it Matters to You
This new Frost & Sullivan executive brief explores today's trends in audio conferencing, the impact of a diverse user base and how pricing models are evolving to match use.
Provided By Citrix Online
-
Webinar Ready: A Step by Step Guide to Hosting Successful Webinars
Like any good performance, the live webinar should capture attention and stir discussion. For the content marketer, this conversation ends only when the curtain falls on a successful sale.
You're creating a one-act play, so your players have to be well-rehearsed, relaxed, professional and on message.
This...Provided By Citrix Online
-
7 Deadly Sins of Online Training (and How to Avoid Them)
Join Roger Courville, Webinar expert and author of The Virtual Presenter's Handbook, for a Webinar on how to plan, design and present like an online training pro.
Provided By Citrix Online
-
Which Mobile Device Is the Most Secure?
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....
Provided By Sophos