Wireless Computing Systems Hardware White Papers

(View All Report Types)
More advanced business-class management, security, and reliability than Lenovo. Do more with Dell Latitude.
sponsored by DellEMC and Intel®
WHITE PAPER: This whitepaper offers a checklist for laptops that compares two leading offerings with regards to manageability, durability, and “securability.”
Posted: 14 Mar 2014 | Published: 14 Mar 2014

DellEMC and Intel®

Plantronics Wireless Density: Whitepaper
sponsored by Insight and Plantronics
WHITE PAPER: This white paper breaks down the four considerations that must be dealt with when installing wireless headsets.
Posted: 12 Nov 2013 | Published: 12 Nov 2009

Insight and Plantronics

Plantronics Savi 700 Series: Product Guide
sponsored by Insight and Plantronics
WHITE PAPER: This white paper details a wireless headset that allows you to manage your PC, mobile and desk phone all at once.
Posted: 14 Nov 2013 | Published: 16 Nov 2011

Insight and Plantronics

School Bus Tracking Market Brief
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how mobile resource management (MRM) solutions can give administrators greater visibility into the location of assets and help organizations create a safer, more cost-effective transportation system.
Posted: 13 Oct 2011 | Published: 13 Oct 2011

AT&T Corp

Video Surveillance Economics: The New Picture of Quality and Economy
sponsored by Motorola Solutions
WHITE PAPER: As the world becomes increasingly security conscious, municipalities, institutions and enterprises of all sizes are discovering that there's safety in sight. Real-time video surveillance systems are proving to be one of the most effective methods of addressing a wide range of security challenges in both the public and the private sectors.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

Motorola Solutions

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola Solutions
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola Solutions

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and Intel®

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by TechTarget Security
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

TechTarget Security

Mobile Device Management: Fundamental steps for success
sponsored by TechTarget Security
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

TechTarget Security