Data Communications Reports

A Guide to Effectively Managing Enterprise Wi-Fi Networks
sponsored by Motorola Solutions
WHITE PAPER: In order to avoid making WLAN administration a full-time headache, IT administrators who are deploying or extending enterprise WLANs must make sure that RF management is not an afterthought, but a priority. This paper will show you how to d...
Posted: 25 Oct 2007 | Published: 01 Sep 2007

Motorola Solutions

Applying RFID Technology in High Volume Manufacturing
sponsored by Intel Corporation
WHITE PAPER: The recent evolution of global radio frequency identification (RFID) standards is leading many manufacturers to accelerate their investigations of its potential. Read this report to explore how (RFID) technology can be used for high volume manufacturing.
Posted: 20 Aug 2007 | Published: 01 Sep 2005

Intel Corporation

Barcodes vs RFID: The pros and cons of each side reviewed
sponsored by IQMS
EGUIDE: This e-guide reviews the pros and cons of bar code technology, and addresses niche areas where radio frequency identification (RFID) is gaining traction.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

IQMS

Cooper University Hospital Utilizes Cisco IPT and Wireless Network to Track Equipment and Enhance Patient Safety
sponsored by Dimension Data
CASE STUDY: After successful prior engagements, Cooper University Hospital (CUH) asked Dimension Data to implement an IP telephony (IPT) solution for its existing data center and new Medical Coordination Center (MCC).
Posted: 25 Feb 2010 | Published: 25 Feb 2010

Dimension Data

CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits
sponsored by TechTarget ComputerWeekly.com
EZINE: Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.
Posted: 08 Feb 2021 | Published: 21 May 2020

TechTarget ComputerWeekly.com

The rise of edge computing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The growing momentum around 5G has spurred the rise of edge computing applications designed to crunch and process data at the edge of the network. In this e-guide, read more about edge computing developments in the Asia-Pacific region, as well as the pros and cons of adding edge computing to a cloud architecture
Posted: 18 May 2021 | Published: 19 May 2021

TechTarget ComputerWeekly.com

Computer Weekly - 28 July 2020: Meet the CIO connecting IT in the most inhospitable environments
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we discuss the challenges of running global IT in the world of copper mining. We look at how tech vendors are adapting their products to meet the lockdown demands of working from home. And we examine how zero-trust methods can help secure container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 28 Jul 2020

TechTarget ComputerWeekly.com

CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis
sponsored by TechTarget ComputerWeekly.com
EZINE: The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

A Proactive Approach To Field Service 5 Priorities For Implementing Strong Service Foundations
sponsored by ServiceNow
EBOOK: This report explores transitioning from reactive to proactive field service model, highlighting 5 priorities. Read on to understand them and to see how ServiceNow enhances operations by connecting teams, streamlining tasks, and empowering customers with its platform and Field Service Management app.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

ServiceNow

CW Europe - September-November 2020: IT expertise in banks' boardrooms reduces risk, says European regulator
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The European Central Bank has found that banks with the most IT expertise in the boardroom have better control in several IT risk categories, including fewer successful cyber attacks and less downtime of critical IT systems.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TechTarget ComputerWeekly.com