WLAN-AP Reports

The Case for Next-Generation Wireless LANs: Faster Connections and More Applications and Users
sponsored by Brocade
WHITE PAPER: Read this whitepaper to discover how the next generation of WLANs is creating faster connections, more applications, and a better experience for end-users.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Brocade

Presentation Transcript: Wired and Wireless Network Infrastructures-- Planning Tips to Improve Network Performance and Reduce Costs
sponsored by Belden
PRESENTATION TRANSCRIPT: This presentation transcript, taken from the webcast of the same name, will help inform network designers, planners and installers of important considerations in planning to help them optimize combined network performance and reduce project costs. It will provide recommendations and tips for installing or upgrading a structured cabling plant.
Posted: 24 Apr 2009 | Published: 24 Apr 2009

Belden

Buyer's Guide: What To Look For In 802.11ac Access Points
sponsored by TechTarget Networking
EBOOK: Many enterprises are looking to upgrade their wireless LAN access points (APs) to Gigabit Wi-Fi 802.11ac standards. This essential buyer's guide explores essential 802.11ac features like self-configuration, backwards-compatibility with older APs, dual Gigabit-Ethernet ports for higher throughput, and ease of management.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

TechTarget Networking

Getting Your Wireless Together to Save Time, Improve Reception
sponsored by Cisco Systems, Inc.
WHITE PAPER: When you “cluster” standalone wireless access points, you can improve reception and roaming, strengthen security, and save many hours of technical labor—all without the expense of a wireless controller. Continue reading to learn more about clustering improvement.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

TechTarget Security

How to Get Better and Faster with Wireless-N
sponsored by Cisco Systems, Inc.
WHITE PAPER: When will your business begin using next-generation wireless technology? Wireless-N (802.11n technology) is already in users' newer devices—laptops, desktops, IP phones, and smartphones. Continue reading to learn more about Wireless-N, it's business advantages and best practices.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

Wireless LANs and Multimedia: Matching wired network performance and quality
sponsored by TechTarget Security
EZINE: The June edition of SearchNetworking.com’s Network Evolution E-Zine outlines the three basic steps enterprises should follow when preparing for video. Uncover how to integrate these steps into your network plans and learn how to say goodbye to your troubles with video.
Posted: 01 Jun 2012 | Published: 30 May 2012

TechTarget Security

Mobilize to Rightsize Your Network
sponsored by Aruba Networks
WHITE PAPER: Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!
Posted: 30 May 2012 | Published: 14 Mar 2011

Aruba Networks

Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER: Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007

Motorola Solutions

WLAN Access Control and Wi-Fi Network Needs
sponsored by TechTarget Security
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

TechTarget Security