Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
Ensuring application security in mobile device environments
In today’s business environments, mobile devices make up the fastest growing segment of computing devices—outpacing desktop and laptop computers. As more employees prefer to use mobile devices in the workplace, organizations are rapidly moving towards a bring-your-own-device (BYOD) model—allowing employees to use their own mobile devices for business purposes. This...
Sponsored By IBM
-
Ensuring application security in mobile environments
As mobile device use in the workplace continues to increase rapidly, more organizations are placing mobile application security as a top security priority. For different types of mobile applications, there are many potential vulnerabilities attackers can exploit to gain access to sensitive data. Providing security for mobile applications requires the...
Sponsored By IBM
-
Mobility Product Demo
Redesigned and reimagined for the mobile world, Workday Mobile offers all the same insight, information, and intelligence you get on your desktop. And it's delightfully easy to use—Workday’s touch-optimized interface offers easy access to tasks, real-time analytics, and worker information.
Sponsored By Workday
-
Use of Resource Pools in VMware vSphere DRS Clusters
Resource Pools are often misunderstood, disliked, and untrusted by vSphere Administrators who have been burned due to unexpected results of improperly configured resource pools. This white paper examines several scenarios based on actual customer resource pool implementations. Some scenarios describe examples of poorly configured pools. Other scenarios describe examples of...
Sponsored By Global Knowledge
-
Simplify Your Route to the Internet: Three Advantages of Using LISP
The Location ID separation protocol (LISP) simplifies the process of connecting multi-homed sites, and also presents distinct advantages for networks. These advantages include simplicity over BGP, load balancing, and mobility.
Sponsored By Global Knowledge
-
The Evolution of Cisco Switching
A thorough understanding of the fundamentals of routing and switching dynamics is not only necessary but expected by network professionals today. While the various processes may run almost invisibly on a properly configured device in a healthy network, inevitable issues will nearly always require the ability to examine problems at...
Sponsored By Global Knowledge
-
Protecting Applications and Data in a Virtual World with Dell AppAssure
Dell AppAssure provides holistic protection both for physical and virtual environments, dramatically improving recovery time and recovery point objectives. AppAssure delivers:
- Management of virtual and hybrid environments from a single console
- Automatic testing of every backup on a nightly basis
- Smart agent architecture to instantly recover...
Sponsored By Dell
-
2013 Mobile Malware Report
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users...
Sponsored By Blue Coat Systems
-
IP Version 6 Transitions Mechanisms
As with the adoption of any new technology, the move from IP version 4 to IP Version 6 will take a number of years to complete. During that transition phase, various mechanisms will be necessary to continue support of the older protocol as the newer gains widespread momentum. In addition,...
Sponsored By Global Knowledge
-
openBench Labs: How Diskeeper 12 Keeps the Latest Windows OS Running Like New
There are inherent behaviors associated with Windows that degrade system performance over time. In this Executive Summary, openBench Labs provides a technical narrative on the nature of Windows system performance issues, and performs testing to validate Condusiv's Diskeeper 12's ability to accelerate the latest Windows environments.
Sponsored By Condusiv Technologies
-
OnDemand: Faster VMs Guaranteed – No Hardware Required
Learn how optimizing I/O at the source on virtual machines provides up to 50% or more application performance at a fraction of the cost of hardware. By eliminating unnecessary I/O traffic at the guest level, there is far less traffic pushed into the server, network, and storage.
This OnDemand...Sponsored By Condusiv Technologies
-
5 Best Practices for Mobile Business Intelligence
Considering rolling out mobile business intelligence? The benefits are obvious: get data where decisions are made and in the hands of people who need it. Spread business intelligence more widely throughout your organization and create a culture of data-driven decision making.
But going mobile doesn't just happen. There are fundamental...Sponsored By Tableau Software
-
Building a Cisco Certification Lab
Building a flexible lab environment is an essential and critical part of any certification study environment. The first step, either the CCENT or CCNA, requires an environment that is complete enough to cover all of the exam topics, but simple and inexpensive enough to easily construct. Learning concepts is important,...
Sponsored By Global Knowledge
-
Export Operation & Compliance Benchmark Report: Going Global w/ Regulatory Reform
Welcome to the second annual benchmark study covering U.S. export operations and compliance produced by American Shipper in partnership with BPE Global and the International Compliance Professionals Association (ICPA). More than 300 U.S.-based exporters participated in this 35 question survey covering export regulatory reform, operations management practices, organizational structure, compliance...
Sponsored By SAP
-
Hybrid Cloud Storage: Getting the Best of Two Worlds
The Aberdeen Group surveyed 106 enterprises spanning various sectors to see how they are dealing with very high growth storage. In this report we look at each component of Hybrid Cloud Storage. As users of this new technology, they will be able to choose where to locate their data, on-premise...
Sponsored By Red Hat
-
Ten Smart Things to Know About Storage
Learn about trends, developments and tips to make your storage environment more efficient.
Sponsored By NetApp
-
SUSE Linux Enterprise Server on the IBM PureFlex System
The SUSE Enterprise Linux Server, now on the IBM PureFlex System, provides an open, reliable and secure IT environment with faster deployment, better business agility, lower power consumption, better hardware utilization and lower total cost of ownership.
Sponsored By IBM
-
A New Day: How Smarter Computing can Grow Capacity on Flat Costs
How smarter computing can grow capacity on flat costs.
Sponsored By IBM
-
Hyper-Mobility meets Security in the Corporate Environment
Huge amounts of valuable business-related information may be stored and processed on a mobile device, and this means that smartphones make attractive targets for criminals, leading to corporate data leakage, unauthorized access and malware infection. In the UK alone, during 2010, 228 phones were reported stolen every hour.
Read...Sponsored By Kaspersky Lab
-
12 Steps to Bring Your Own Device (BYOD) Success
IT departments have multiple opportunities and challenges as a result of the Bring Your Own Device (BYOD) invasion. The most common opportunity is to reinforce enterprise network security from both the inside and the outside. Supporting BYOD also offers more monitoring and tracking of activities that provide a more detailed...
Sponsored By Global Knowledge
-
Tips for Maximizing Efficiency in a VMware vSphere Environment
There are many ways to improve efficiency in a VMware environment. This paper provides many tips for achieving a more efficient environment from looking at the storage to viewing the entire environment's health with one view. It also reviews many of the products offered both as part of the vSphere...
Sponsored By Global Knowledge
-
Ten Rules of RIPv2
Over the years, the need for RIP has declined as IP-based networks evolve into more complex topologies. However, there is still a valid use for RIP, especially with the added features found in RIPv2. Here are ten useful rules to remember for RIPv2.
Sponsored By Global Knowledge
-
Accelerated Networks Drive Better Business Outcomes
Many organizations are evaluating a more business-oriented approach to service levels and advanced network optimization technologies. This approach to Network Applications Services leverages best practice solutions from systems integrators, network technology vendors, and applications providers. By linking IT activities directly to measurable business outcomes, this more comprehensive approach is now...
Sponsored By Global Knowledge
-
Designing Network for Rich Media Communications
IP networks are the standard for delivering converged application like video collaboration, voice over IP, video surveillance, and on-demand video. Real-time applications like video and voice can become useless due to network delays and congestion, placing unique demands on the IP networks. This paper discusses designing a video-ready network and...
Sponsored By Global Knowledge
-
The Network Manager Checklist for Cloud
According to the U.S. National Institute of Standards and Technology, "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction." This white paper provides a six-point...
Sponsored By Global Knowledge
-
10 Current Security Threats for Individuals
We now live in a world where new threats are poised to cause us harm in ways most of us never dreamed possible. The convenience and benefits of Internet access, always-on connectivity, and mobile devices have made us vulnerable to these attacks. It is time for us to adopt a...
Sponsored By Global Knowledge
-
Restoring Data with Database Snapshots
What DBA wouldn't appreciate a process that allows for fast and easy restoration of lost data, allowing you and your users to examine the information before restoring it, to use a minimal amount of drive space, and to carry out all the necessary steps with only local resources? This white...
Sponsored By Global Knowledge
-
Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment
Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT
You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed.
And, you...Provided By Citrix Online
-
Which Mobile Device Is the Most Secure?
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot....
Provided By Sophos
-
Your Company Data, Their Personal Device — What Could Go Wrong?
Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.
Provided By Sophos
-
Mobile Browsing - Is Your Company at Risk?
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And...
Provided By Webroot Software
-
Machine-to-Machine Technology Roundtable: The CIO Perspective
Objects connected directly to the Internet, dubbed machine-to-machine, or M2M, technology provide a plethora of possibilities for organizations. Machines communicating directly with other machines with minimal human intervention poses exciting possibilities that will change the technology landscape significantly over time.
The most interesting thing about M2M technology is that...Provided By Verizon
-
Putting Mobile First: Best Practices of Mobile Technology Leaders
This report is an IBM study that investigates the approaches organizations are using to support the transformational shift to mobile. The study report defines the resulting Mobile Infrastructure Maturity Model and documents the best practices and characteristics of organizations that are leaders in order to help other organizations improve and...
Provided By IBM
-
Does your IT infrastructure put mobile first?
The shift to mobile is dramatically changing the way people work and organizations conduct business. This infographic is the result of the latest IBM Global IT Study on Mobile Infrastructure.
Provided By IBM
-
Mobile Is The New Face Of Engagement - A CIO Whitepaper by Forrester
CIOs Must Plan Now For New Systems Of Engagement.
To remain vital in this business technology reformation, CIOs must step up and work with other executives to implement an enterprise-wide mobile strategy. This team will coordinate the business and technology investments under a design-for-mobile-first mantra that delivers four immediate...Provided By SAP
-
Mobile Solution Scalability: Designing Solutions for Tomorrow’s Needs
The combination of a growing mobile workforce, advances in mobile technology and the overall proliferation of mobile devices and services is ushering a new IT era.
One of the first-deployed critical building blocks to any comprehensive mobile IT strategy is a mobile device management (MDM) solution that serves to...Provided By SAP
-
TBR Corporate IT Buying Behavior and Customer Satisfaction Study
Leading IT industry analysts Technology Business Research (TBR) conducts quarterly x86 Server Customer Satisfaction (CSAT) studies to identify what factors are most important to small and midsize companies. This white paper summarizing the study results explains why IBM® System x® servers, efficiently powered by the latest Intel® Xeon® processors, are...
Provided By IBM and Intel
-
Building The Business Case For a BYOD Program
This report outlines Forrester's guidance for developing a business case to justify a BYOD program to support your workforce computing strategy. Supporting the growing number and increasing diversity of mobile devices used for work is particularly challenging for I&O executives. Results of Forrester's Forrsights Workforce Employee Survey, Q2 2012 show...
Provided By Absolute Software
-
Mobile Devices: The New Thin Clients
As IT organizations grapple with some of the profound changes being brought on by the explosion of mobile devices, the rapid adoption of bring your own device (BYOD), and the transition from Windows XP to Windows 7, many of them are taking a fresh look at their client devices and...
Provided By Citrix
-
Four customers who never have to refresh their PCs again
As mobile workstyles reinvent the way people and businesses operate, IT organizations are in a position to enable new levels of mobility, productivity and efficiency - but not if the high cost of their legacy endpoint environment prevents them from making strategic investments in innovation. Desktop virtualization, paired with thin...
Provided By Citrix
-
BlackBerry Enterprise Service 10 In Action
Designed for business leaders, IT decision-makers and IT administrators, this webcast features organizations that have migrated to BlackBerry? Enterprise Service 10 or are in the process right now. Hear first-hand how BlackBerry Enterprise Service 10 has simplified the management of their mobile deployments. Whether your organization is a small-medium business...
Sponsored By BlackBerry
-
The Future of Ubiquitous Communications
Right-time experiences. The internet of things. Machine-to-people communications. How will these factors impact mobility planning for enterprises? By combining the right strategy with new mobile technologies, business leaders can create new business processes that deliver the right experience at the right time. This webcast explains how devices such as smartphones,...
Sponsored By BlackBerry
-
ActiveSync and BlackBerry 10: What you Need to Know
Interested in basic security and management for BlackBerry 10 users in your enterprise? Understand what services are provided through Microsoft? ActiveSync and how BlackBerry? Enterprise Service 10 and ActiveSync interact. Learn best practices for deploying BlackBerry? 10 with Microsoft? Exchange, IBM Lotus? Domino?, Novell GroupWise? and Google platforms. And find...
Sponsored By BlackBerry
-
BlackBerry 10 Apps: Samples and Demos You Can Implement Today
Access this on-demand webcast and grab some powerful BlackBerry® 10 code samples, ready-made for business app developers. You’ll also find out about great resources you can turn to for all the support and additional learning you could want. Kickstart your application right now.
Sponsored By BlackBerry
-
BlackBerry 10: Setting New Standards in Mobile Security
BlackBerry® is the market leader in mobile security and has been for the last decade. And the powerful security features you may rely on today haven't gone away with BlackBerry 10. Instead, take advantage of new capabilities that give you precisely the control you want and need for true Enterprise...
Sponsored By BlackBerry
-
BlackBerry 10: Easy to Use with ActiveSync
You may already know that BlackBerry® 10 smartphones can be activated using the Microsoft® ActiveSync® protocol for basic security and device management. See what’s involved in ActiveSync setup, for both IT and end users. And find out what you can do with BlackBerry® Enterprise Service 10, for full Enterprise Mobility...
Sponsored By BlackBerry
-
Best Practices in BYOD: BlackBerry Enterprise Service 10
Manageability, security and support – these are just a few of the reasons BlackBerry® Enterprise Service 10 is such a powerful Enterprise Mobility Management (EMM) solution. But as you’ll learn in this overview document, what makes it stand out even more is its flexibility: Control devices running on iOS, Android™...
Sponsored By BlackBerry
-
BlackBerry Enterprise Service 10 Implementation Solutions
BlackBerry? implementation and migration services are designed to help you optimize your Enterprise Mobility Management infrastructure and ease your transition to BlackBerry? 10. Find out how to keep your business moving, with a wide range of support options that deliver the level of expertise, assistance and resolution time you need....
Sponsored By BlackBerry
-
BlackBerry Enterprise Update
Wondering what’s next in the exciting evolution of enterprise solutions from BlackBerry®? This webcast offers a sneak peek at the BlackBerry enterprise roadmap, starting with a review of recent innovations and then looking ahead to products and services on the horizon. This webcast offers the insight you need to help...
Sponsored By BlackBerry
-
BlackBerry Z10: Raising the Bar for Business
BlackBerry® 10 is an entirely new mobile computing platform. It allows you to move through tasks efficiently and effortlessly, reducing many of the ‘ins and outs’ that other mobile devices require today. Here are just a few of the reasons end users love BlackBerry 10.
Sponsored By BlackBerry
-
BlackBerry Enterprise Server 5 to BlackBerry Enterprise Service 10 - Lifting The Hood
Wondering exactly how upgrading to BlackBerry® 10 will benefit your organization? Perfect for IT administrators, this webcast takes a close look at the differences between BlackBerry Enterprise® Service 10 and BlackBerry® Enterprise Server 5. Learn how BlackBerry Enterprise Service 10 focuses on the management of BlackBerry smartphones and tablets to...
Sponsored By BlackBerry
-
Enterprise Feedback: Why Mobile Computing Corp. Inc. is Implementing BlackBerry 10
Mobile Computing Corp. Inc. (MCC) has been developing mobile field force automation solutions for over 25 years. Having put BlackBerry® 10 and BlackBerry® Enterprise Service 10 to the test during a pre-launch trial, CEO Camille Peters concluded that “the strength of BlackBerry 10 is great and the support is outstanding.”...
Sponsored By BlackBerry
-
BlackBerry Unified Communications and Collaboration Strategies
Join this webcast to explore the world of Unified Communications and Collaboration (UCC) with BlackBerry® 10. Learn how UCC is improving the way individuals, groups and companies interact to increase productivity, optimize business processes and decrease costs. BlackBerry® enables secure UCC with the only truly integrated voice, messaging, PIM, apps...
Sponsored By BlackBerry
-
Doing More, with Enterprise Applications and BlackBerry 10
BlackBerry® 10 delivers an incredible apps ecosystem, full of new ways to empower your business. Chances are, you’ve got questions: Will the apps we use today work with BlackBerry 10 devices? Will our custom apps need to be redeveloped? What are the options for distribution and management? Get the answers...
Sponsored By BlackBerry
-
The BYOD Trend - Where it's Headed and Key Considerations for the Future
The BYOD trend is here to stay and many organizations continue to adapt to embrace the trend. Join this webcast to hear an industry analyst's thoughts on the future of BYOD in enterprise mobile deployments and discover the key considerations for enterprises as this trend continues to develop.
Sponsored By BlackBerry
-
Getting Ready for BlackBerry 10 and BlackBerry Enterprise Service 10: Tips for the IT Manager (webcast)
Learn what you can to do now to make sure your organization’s transition to BlackBerry® Enterprise Service 10 is smooth and seamless. This webcast addresses installation, upgrading your licenses, preparing your apps and more. Plus, find out how to access BlackBerry Readiness Services for support every step of the...
Sponsored By BlackBerry
-
BlackBerry 10 Tips and Tricks from the Pros
BlackBerry® 10 was built from the ground up to let you work smarter, faster and more efficiently. In this webcast, find out how the advanced users do more, faster with their BlackBerry 10 devices – with tips and tricks on using the swipe and peek capabilities, flick typing, Time Shift...
Sponsored By BlackBerry
-
How BlackBerry Technical Support Services Are Evolving with BlackBerry 10
With the release of BlackBerry® 10, BlackBerry® Technical Support has evolved. As powerful as ever, it’s now streamlined and simplified. In this webcast, get all the details, and find out about BlackBerry Readiness Services you can access as your organization makes the move to BlackBerry 10.
Sponsored By BlackBerry
-
Make the Most of Your Investment: Get FREE BlackBerry 10 Licenses
Leverage your investment in BlackBerry® solutions when you upgrade users to BlackBerry® 10 smartphones. Through to December 31, 2013, organizations purchasing BlackBerry 10 smartphones can trade up their existing BlackBerry® Enterprise Server licenses one-for-one – free. Find out exactly how in this overview document.
Sponsored By BlackBerry
-
Getting Ready for BlackBerry Enterprise Service 10: Tips for the IT Manager
BlackBerry® Enterprise Service 10 is a next-generation Enterprise Mobility Management (EMM) platform for securely managing all your organization’s devices: BlackBerry, iOS and Android™ smartphones and tablets, personally owned or corporate-deployed. This overview document provides 10 hands-on tips for IT administrators who want to make their organization’s transition to BlackBerry® 10...
Sponsored By BlackBerry
-
Upgrading to BlackBerry 10: The Road Ahead
For IT administrators interested in upgrading to BlackBerry® 10, join this deep-dive webcast to learn exactly what you need to do to deploy and manage BlackBerry 10 devices in your organization. Find out what’s new in BlackBerry® Enterprise Service 10.1, see how to prepare your environment for device roll-out, hear...
Sponsored By BlackBerry
-
BlackBerry Enterprise Server License Trade Up Program
Leverage your investment in BlackBerry® solutions when you upgrade users to the re-invented BlackBerry smartphone, powered by BlackBerry® 10. Through to December 31, 2013, organizations purchasing BlackBerry 10 smartphones can trade up their existing BlackBerry® Enterprise Server licenses one-for-one – free. Find out exactly how in this short webcast.
Sponsored By BlackBerry
-
Migrating Apps to BlackBerry 10
Enterprise App Developers: Porting your existing BlackBerry® OS apps (and apps you’ve developed for other platforms) over to BlackBerry® 10 is easy. In this webcast, learn the various ways to build apps for the BlackBerry 10 platform and understand your web, HTML5 and Native C/C++ development options.
Sponsored By BlackBerry
-
The Wild, Wild West of Mobile
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...
Sponsored By Webroot Software
-
How to get manageable endpoint, mobile device and web security together
Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult with many employees have two, three or four Internet-connected devices containing sensitive...
Sponsored By Webroot Software
-
Unify Your Networks For The Mobile Enterprise Infographic
In order for a corporation to embrace the personal cloud era, offering connectivity and quality delivery of multimedia applications everywhere on any device, it must transform to a mobile enterprise. It will need an infrastructure that includes a right sized core, pervasive WLAN, unified access and an automated network that...
Sponsored By Alcatel-Lucent
-
Wireless LAN ClientMatch Technology
Ensuring that all wireless network clients get the service levels they need is a major challenge -- especially when smartphones, tablets and other clients control their own connectivity and roaming decisions. ClientMatch™ technology is an RF management technology that puts the WLAN infrastructure in control of client connectivity and roaming....
Sponsored By Alcatel-Lucent
-
Live Webcast: Introducing New Technology to Your Users: A Make or Break Moment
Join us for this LIVE event! Tuesday, October 8th 10:00 AM PDT / 1:00 PM EDT
You only get one chance to make a first impression. You might be delivering brilliant, flawless technology, but if users are confused when they first encounter it, they’ll be disappointed.
And, you...Provided By Citrix Online
-
One hundred and One uses For Emergency Notification
When a disaster or crisis occurs, lack of communications and slow response team mobilization can make them far worse. Automated two-way communication enhances incident management by delivering disaster response, works over multiple mediums and can reach thousands or tens of thousands of people in minutes.
In this white paper,...Provided By Dell Software
-
Review Paper On CarPooling Using Android Operating System-A Step Towards Green Environment
As a rapid increase in urbanization, there is huge problems face in travelling. People are migrating from on city to other in search of jobs. This result in increasing population and thus resulting in insufficient transportation facilities. Due to this people prefer to travel by their own vehicle than using...
Provided By University of Puerto Rico
-
Performance Comparison of Routing Protocols for Zigbee Wpan
A Wireless Sensor Network (WSN) is ad hoc network. Each node in WSN will participate in routing process, based on the dynamic activity of the network connectivity. The peer-to-peer nature of wireless ad hoc networks makes them suitable for a variety of applications where coordinator can't be relied on, and...
Provided By International Journal of Computer Science Issues
-
A Distributed and Energy-efficient Clustering Method for Hierarchical Wireless Sensor Networks
In the hierarchical Wireless Sensor Network (WSN), cluster-based network architecture can enhance network self-control capability and resource efficiency, and prolong the whole network lifetime. Thus, clustering has also been a topic of interest in many different disciplines. Finding an energy-effective and efficient way to generate cluster is very important in...
Provided By Nanjing University of Science & Technology
-
Capturing of HTTP Protocol Packets in a Wireless Network
The word wide revolution in wireless technology is changing the authors' lives in term of the way they learn and use. Wireless Networks fit into this because the technology has been around long enough and can provide various benefits for development in this area. The main objective of this paper...
Provided By International Journal of Electronics Communication and Computer Engineering
-
Dynamic Channel Estimation for MIMO-Constant Envelope Modulation
The Multi-Input Multi-Output (MIMO)- Constant Envelope Modulation MIMOCEM is introduced as power and complexity efficient alternative to MIMO-OFDM for wireless backhaul networks. Due to a low resolution ADC (1-bit in the default operation) employed in the MIMO-CEM receiver, MIMO-CEM channel estimation is considered as one of the major challenges toward...
Provided By The Society of Digital Information and Wireless Communications (SDIWC)
-
Mobile Commerce Playbook: The Path to Customer Engagement
As the Web spawned electronic commerce, mobile phones have spawned mobile commerce. And the potential lies far beyond a simple transaction. A key facet of any mobile commerce strategy is establishing the ability to collect and analyze data for patterns of behavior. Mobile provides an unprecedented way for enterprises to...
Provided By SAP
-
Modelling and Optimization of Power Consumption in Wireless Access Networks
In this paper, the power consumption for five different wireless technologies, namely mobile WiMAX, fixed WiMAX, UMTS, HSPA and LTE is investigated based on the parameter assumptions for the five technologies. This power consumption is then related to the coverage of the base station. The base stations (macro-cells) are placed...
Provided By Reed Elsevier
-
Towards Statistically Strong Source Anonymity for Sensor Networks
For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficult and expensive to achieve. This is not only because adversaries may attack against sensor source privacy through traffic analysis, but also because sensor networks...
Provided By Institute of Electrical and Electronics Engineers
-
Meeting the mobile challenge with IBM System z
IBM Software for System z delivers the security, systems connectivity, and development capabilities to meet tough enterprise mobile requirements.
Mobile is huge. The use of mobile devices and apps is pervasive in our everyday lives - on average, mobile users check their devices 30 times per hour. And with...Provided By IBM
-
Airshark: Detecting Non-WiFi RF Devices Using Commodity WiFi Hardware
In this paper, the authors propose Airshark - a system that detects multiple non-WiFi RF devices in real-time and using only commodity WiFi hardware. To motivate the need for systems like Airshark, they start with measurement study that characterizes the usage and prevalence of non-WiFi devices across many locations. They,...
Provided By Association for Computing Machinery
-
User satisfaction survey
Surveys offer an excellent way to determine the level of end-user satisfaction, but to get accurate and useful results, you need a clear and simple assessment form. This survey includes a mix of easily answered check box questions designed to gauge user satisfaction with equipment and support. It also includes...
Provided By TechRepublic