Management Update: Wireless LAN Predictions for 2004
|
|
- Kristin Walker
- 5 years ago
- Views:
Transcription
1 IGG K. Dulaney, R. Ahlawat Article 19 November 2003 Management Update: Wireless LAN Predictions for 2004 Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will achieve greater integration with the wired infrastructure in 2004, leading to greater VoIP (voice over Internet Protocol) integration in Wireless LAN (WLAN) technology and use continue to evolve at a rapid pace. WLANs will achieve greater integration with the wired infrastructure in 2004, leading to greater VoIP (voice over Internet Protocol) integration in Strong Growth for WLANs WLANs will continue on an unabated growth path in The rapid adoption is fueled by the following: Declining WLAN equipment prices Intel s strong marketing of its Centrino platform Burgeoning WLAN use in homes Improvements in WLAN security Further integration with wired LAN networking platforms As Gartner discusses in other Predicts 2004 research, most notebooks will come with bundled WLAN capability, enabling most notebook users to participate in WLAN networks with little effort. Almost every major enterprise is aware of the technology and has at least some limited deployments. Enterprises should recognize that wireless has become a core part of every enterprise network and can no longer be regarded as an elective technology. Consequently, enterprises must own their airspace because it becomes a resource to deliver computing capabilities. Reasons to Deploy WLANs Gartner Entire contents 2003 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 During 2004, additional applications such as voice will begin to emerge as primary reasons to deploy WLANs, although progress in this area will be plagued by a lack of standards and a shortage of handset choices. However, most use will consist of light-duty access to networks often pegged at 15-Mbps peak requirements or less. Switches will be enhanced to include WLANs, finally integrating WLANs into the core fabric of enterprise networks. Security deficiencies will cease to become a serious inhibitor to deployment. Prediction: The Institute of Electrical and Electronics Engineers (IEEE) i security standard will be approved in i, the long-awaited security standards enhancement to the WLAN specification, should be ratified in i consists of one authentication component, 802.1x the same standard used in the wired world and two encryption technologies, Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard. Early in 2003, the Wireless Fidelity (Wi-Fi) Alliance began certification for Wi-Fi Protected Access, a subset of some of the early revisions of i TKIP combined with 802.1x. Strategic Planning Assumption: The IEEE i WLAN security standard will be approved by 2H04 (0.7 probability). A robust encryption standard that has been thoroughly thought through by a strong industry consortium Continued support for previous standards including Wi-Fi Protected Access, a preliminary standard recommended by Gartner Pre-standard deployments, which are claimed as standard and should be regarded as such Enterprises should no longer view WLAN security shortcomings as a barrier to deployment of WLANs. One of two approaches can be taken: Adoption of Wi-Fi Protected Access or one of the capabilities of I A virtual private network (VPN) approach that consists of open access points with an overlay security system connecting devices to the backbone wired network (standard and nonstandard approaches are available and acceptable) The question of whether to wait for full i support depends on the security policies of the enterprises.
3 Although Wi-Fi Protected Access is secure and recommended, some enterprises may want higher levels of encryption to meet special threats, or to simply be on the formal standard. For enterprises seeking the latter, all purchases should be capable of upgrade, which is most easily done by employing a switch architecture where the implementation of i is in firmware or software. Prediction Enterprises will begin to adopt a/g as a de facto standard. Most WLAN deployments today use b technology. For most uses during the next several years, b, acting as a complement or a wired replacement for generic application use, is more than sufficient. It is also less expensive and more stable than emerging alternatives. In 2004, however, continued progress in silicon improvements will deliver a/g capability at a relatively little cost delta from b (note that g provides backward compatibility to b). As surrounding standards mature and are combined with a/g, this technology will become more acceptable. Also, given the need to detect rogue access points, enterprises must purchase technology that can monitor frequencies and technical standards, even when they are not in use. Gartner cautions buyers to carefully examine the specifications of any purchased technology to ensure that all required and future frequencies are covered, and that the included standards match the governmental requirements of their respective countries. That said, a/g will become the mainstream choice for enterprises over b, g or a/b offerings by year-end Strategic Planning Assumption: By year-end 2004, 80 percent of new enterprise WLAN installations will include a/g technology (0.7 probability). A significant increase in WLAN performance A broader range of notebook a/g offerings, with adapter prices no more than $20 greater than b offerings A strong marketing push to select a/g technology over b in business applications a technology represents the future of WLANs.
4 802.11a operates at a faster data rate and at 5 GHz frequencies, where less interference exists from widely available consumer items that can degrade network performance (for example, cordless phones). Significantly more channels are offering more flexibility in deployment, especially in future VoIP applications. Enterprises should not remove b installations, but rather complement them with a/g b installations will continue to fulfill many users needs. As a enters the networking fabric, it is important for management to consider policies that reserve some, if not all channels for specific enterprise use. That is particularly important for operations in which the central IS organization cannot control all deployments. For example, a university might want to reserve eight of a possible 24 channels (the number available in Europe and eventually in North America) for specific enterprise applications, while permitting more-open use of the other channels. Note that the 5.7 GHz to 5.8 GHz band, called UNI-III, is an industrial, scientific and medical band that permits consumers to operate, and thus is a likely candidate for this latter purpose. Enterprises must also allocate slightly larger funding for WLAN deployment in the face of a/g. That additional spending will still adhere to the rationale that it is far less expensive to deploy WLAN technologies at the outset of a purchase rather than retrofit at a later date. Prediction Third-generation WLAN architectures will become mainstream. As 2004 progresses, a movement will occur from second-generation, stand-alone access point deployments to third-generation switched architectures, in which WLAN functionality is moved back from the access point to the edge or core network components to improve manageability and reduce costs over a given coverage area. Several choices are available in a switched environment that will require close scrutiny of application needs. Alternatives will range from: Integrated, advanced edge switches that include WLAN WLAN complementary boxes to edge switches Core switches that tunnel to the application provider to provide central management and control functions
5 Overlay systems based on server architectures that operate a higher-level management, functionality and security framework on top of an existing networking landscape Aside from the more-popular network enhancements, VPN boxes are also being upgraded to provide roaming capability, targeting the most security-conscious buyers. In the long term, WLAN capability will appear in many network components as it becomes as mainstream as wired Ethernet. Strategic Planning Assumption: By year-end 2004, the WLAN access point market will crystallize into two segments (0.7 probability): Traditional switches enhanced to include WLAN support New VPN products that overlay security and features on top of mixed LAN/WLAN infrastructure Full integration of LAN and WLAN offerings from incumbent networking vendors A serious dropout of WLAN startup switch vendors, with at least 60 percent not expected to survive more than a few years IT network management to gain solid control over WLAN deployments, an effort that was formerly fragmented, with departments such as warehousing and distribution able to set their own direction A battle between thin and thick access point architectures WLAN deployments are now part of any LAN offering. Enterprises must consult with established LAN vendors to understand their approaches to WLAN deployment in the coming years. That will put more pressure on startup vendors that have not wired their installed base. Many startup vendors believed they could establish themselves in a relatively short time, and that technology development would be sufficiently difficult for the incumbent wired vendors to position the startups as acquisition targets. However, Gartner has been surprised at how quickly the incumbents have added WLAN capability, making the likelihood of the startups acquisition scenario appear remote. Although some startups merit consideration, you should properly evaluate each vendor s financials.
6 Prediction Applications such as voice will begin to emerge as a primary reason to deploy WLANs. Although VoIP adoption over WLAN will be hindered by a lack of standardization and high prices for handsets, Gartner expects certain verticals to begin considering voice over wireless infrastructure as they discover the cost benefits of voice applications in the wireless medium for new installations. The workplace has become increasingly mobile with the introduction of wireless connectivity to laptops. Now, end users can be truly mobile with features such as software IP phones on their laptops, which will enable them to carry their desk phone with them. Strategic Planning Assumption: By year-end 2005, 20 percent of new wireless installations will be driven by VoIP adoption (0.7 probability). Vendors to integrate features needed to support voice traffic without letting the performance of data network suffer Handset costs to come down More wireless vendors to partner with voice handset vendors to offer handsets as part of or integrated in WLAN devices As data and voice start to merge in a wired networking infrastructure, vendors will look at integrating voice and data traffic on WLANs as well. Enterprises must carefully look at the return on investment of running voice applications over a wireless network and take wired infrastructure upgrades into consideration before making a decision. It will be important for enterprises to understand vendors technology implementations of features such as quality of service for handling latency issues and call-drop, because they can significantly affect a user s experience in voice communication but may not be as noticeable in data communication. Performance issues regarding data communications, along with VoIP sessions, will be resolved as a (with an average 33-Mbps link rate) starts being deployed. Vendors will work toward prioritizing VoIP over data traffic, ensuring roaming between subnets and the resolution of latency issues. The IEEE standards body is working on a specification dubbed e that would add the needed voice and quality-of-service protocols. However, e is in early draft stages and may be too late to avoid fragmentation into proprietary implementations.
7 voice products tying cordless phones to WLAN networks are now available, but they use proprietary voice schemes. Marketing spin will be heavy as vendors try to sell varied architectural approaches. Enterprise must assess their future WLAN application environments. Enterprises unable to do this should expect that usage will not be extreme. Thus, they should move more capability back to the core, gaining the economies of scale on the management front and reducing cost over a given area. As requirements increase, hardware capabilities and wired network speeds will improve to provide sufficient support at the edge. Enterprises must also consider the degree of roaming required. Most products have been designed to serve notebook computers rather than handhelds. Notebooks move, but discretely rather than continuously. Technology that is not built for roaming will cause problems such as VPN failures. Bottom Line WLANs must be considered a mainstream part of any networking infrastructure. Prices have declined and standards have improved, making WLANs extremely viable. In many instances, WLANs can reduce costs and increase organizational flexibility. WLAN implementation at remote offices is the easiest case to justify; WLAN installation at headquarters is the most difficult due to the greater prevalence of wired connections. However, during the next five years, user demands will drive most enterprises to establish WLAN capability nearly everywhere in the enterprise. Written by Edward Younker, Research Products Analytical sources: Ken Dulaney and Rachna Ahlawat, Gartner Research For related Inside Gartner articles, see: Management Update: Client Issues for Mobile Applications, (IGG ) Management Update: How to Understand the Benefits of Mobility, (IGG )
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationHype Cycle for Mobile and Wireless Networking, 2003
P. Redman, K. Dulaney, W. Clark Strategic Analysis Report 30 May 2003 Hype Cycle for Mobile and Wireless Networking, 2003 A wireless networking technology assessment for personal-, local- and wide-area
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More informationAction Recommendation for 2004
Strategic Planning, P. Redman, T. Hart, W. Clark, J. Chapman, P. Dittner, R. Simpson, K. Foong, N. Ingelbrecht Research Note 20 November 2003 Changes in Store for Wireless WAN During 2004 The hottest growth
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationWireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary
Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following
More information4Q03 Update: Wireless Communications Semiconductor Forecast,
Forecast Analysis 4Q03 Update: Wireless Communications Semiconductor Forecast, 2003-2005 Abstract: Mobile communications semiconductor revenue was strong in the third quarter. 2003 is on a path for 16
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationSemiconductor Market for Data Processing: Asia/Pacific, 3Q03
Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationIP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary
IP Backbone Opportunities in Asia/Pacific (Executive Summary) Executive Summary Publication Date: September 9, 2002 Author Chee Eng To This document has been published to the following Cluster codes: TELC-WW-EX-0423
More informationGartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7
Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationHype Cycle for Mobile and Wireless Applications and Services, 2003
P. Redman, W. Clark, K. Dulaney Strategic Analysis Report 30 May 2003 Hype Cycle for Mobile and Wireless Applications and Services, 2003 Some wireless applications and services, like Short Message Service
More informationWeb Services Take Root in Banks and With Asset Managers
Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationVendor Ratings, VDR Kevin Strange, Andrew Butler, Gareth Herschel
Vendor Ratings, Kevin Strange, Andrew Butler, Gareth Herschel Research Note 27 January 2003 Vendor Rating: Focus on NCR s Teradata Division NCR s Teradata division is performing well, despite the tough
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationLeased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary
Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew
More informationChina: User Perceptions and Plans for PCs and PDAs in 2003
End-User Analysis China: User Perceptions and Plans for PCs and PDAs in 2003 Abstract: The majority of the Chinese organizations' IT strategies and budget planning issues remain immature. It would not
More informationCIO Update: Gartner s Storage Services Magic Quadrant
IGG-04302003-04 A. Couture, R. Passmore Article 30 April 2003 CIO Update: Gartner s Storage Services Magic Quadrant Gartner has developed its first North American Storage Services Magic Quadrant. Storage
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationVertical Market Trends: Western Europe, (Executive Summary) Executive Summary
Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace
More informationFixed Public Services Trends in CEE and MEA, (Executive Summary) Executive Summary
Fixed Public Trends in CEE and MEA, 2001-2007 (Executive Summary) Executive Summary Publication Date: 4 August 2003 Author William L. Hahn This document has been published to the following Marketplace
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationAIOs Displace Single-Function Printers in Latin America
` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in
More informationSoftware-Defined WAN Does Not Grow on WAN Alone
MARKET FORECAST Software-Defined WAN Does Not Grow on WAN Alone OCT 2017 Jim Duffy, Senior Analyst, Networking Software-defined WAN is expected to undergo robust growth over the next few years, fueled
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationVIEW Certified Configuration Guide. Colubris Networks Series MultiService Controllers with MAP-320/330 MultiService Access Points
VIEW Certified Configuration Guide Colubris Networks 5000 Series MultiService Controllers with MAP-320/330 MultiService Access Points January 2008 Edition 1725-36068 Version E Configuration Guide Trademark
More informationWireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationCurrent and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary
Current and Next-Generation Switching in Asia/Pacific and Japan, 2003 (Executive Summary) Executive Summary Publication Date: 25 August 2003 Authors Hyun-Sook Lee Sumit Malik John Calvert This document
More informationSamsung Security AP WHITE PAPER
WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure
More informationUser Survey Analysis: Next Steps for Server Virtualization in the Midmarket
User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationEverybody s connecting.
Everybody s connecting. The ABGs of Wireless LAN Technology Overview February 2003 Introduction Wireless LANs (WLANs) using the 802.11 standard offer compelling value in office, public, and home LAN environments.
More informationMobile Phones, Poor Economy to Dampen PDA Market to 2007
Forecast Analysis Mobile Phones, Poor Economy to Dampen PDA Market to 2007 Abstract: A stagnant economy and growing competition from mobile phones have reduced our expectations for PDA market growth. Worldwide
More informationAsia/Pacific Enterprise Networking Trends in 2003
Strategic Planning, G. Johnson Research Note 22 November 2002 Asia/Pacific Enterprise Networking Trends in 2003 The Asia/Pacific region faces challenges because of the global telecom turmoil, but there
More information2017 Trends in Datacenter and Critical Infrastructure
PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationISV Support Is Key When Choosing a Server Operating System
Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server
More informationMidsize Businesses Slowly Warm Up to Storage Services
Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references
More informationHuawei: China's Leading Equipment Vendor Returns to Growth
Research Brief Huawei: China's Leading Equipment Vendor Returns to Growth Abstract: Huawei has turned in a strong performance during the first half of 2003. The second half of the year could be even better.
More informationGetting Off Windows XP Is More Important Than Windows Vista vs. Windows 7
Research Publication Date: 12 March 2009 ID Number: G00165756 Getting Off Windows XP Is More Important Than Windows Vista vs. Windows 7 Michael A. Silver, Stephen Kleynhans For most organizations, skipping
More informationManagement Update: Information Security Risk Best Practices
IGG-07022003-01 R. Witty Article 2 July 2003 Management Update: Information Security Risk Best Practices The growing focus on managing information security risk is challenging most enterprises to determine
More informationEurope Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary
Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document
More informationDatabase Design Tool Magic Quadrant 2H02
Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital
More informationWireless Networks
802.11 Wireless Networks Presentation for North Central Regional Meeting October 19, 2010 Tom Jones, PE, RCDD / NTS Field Sales Engineer, D-Link Agenda Brief History of Wireless Networks 802.11b, 802.11g
More informationSpending on Service Provider Routers Begins to Grow in EMEA
Research Brief Spending on Service Provider Routers Begins to Grow in EMEA Abstract: 2Q03 brought the first rise in end-user spending on service provider routers in Europe, Middle East and Africa for a
More informationAsia/Pacific: Systems Consolidation, Hype or Reality?
Research Brief Asia/Pacific: Systems Consolidation, Hype or Reality? Abstract: Through 2005, consolidation will be of major concern to IT management in Asia/Pacific as organizations struggle to control
More informationKW Predicts: Who Will Own the Web-Conferencing Market?
Strategic Planning, J. Lundy, L. Latham, R. Knox Research Note 21 November 2003 KW Predicts: Who Will Own the Web-Conferencing Market? In the knowledge workplace, voice over IP will revolutionize Web conferencing
More informationControlled Medical Vocabulary in the CPR Generations
Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems
More informationSecuring BYOD With Network Access Control, a Case Study
Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions
More informationMidsize Business Voice Service Spending Steady for 2003
End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in
More informationDeploying Mobility using Wireless VoIP
APPLICATION N0TE ST-0119 August 29, 2005 Product: ShoreTel system System version: ShoreTel 6 Deploying Mobility using Wireless VoIP Mobility brings organizations considerable improvements in employee productivity,
More information2016 Summary Annual Report and Annual Meeting Documents
2016 Summary Annual Report and 2017 Annual Meeting Documents To Our Shareholders We enter 2017 with confidence in a bright future ahead for CenturyLink. We are clear in our approach to the market: we
More informationHDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary
HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationExternal RAID-Based Storage System Analysis by Form Factor
Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a
More informationCIO Update: Gartner's Predictions for Storage Hardware
IGG-11262003-03 J. Monroe, F. Yale, R. Passmore, N. Allen, S. Zaffos Article 26 November 2003 CIO Update: Gartner's Predictions for Storage Hardware The need for instant data access and increasingly cost-effective
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationThe Value of Cisco Compatible Extensions (CCX) for Mobile Computers
The Value of Cisco Compatible Extensions (CCX) for Mobile Computers Originally Published: October 2007 Updated: April 2010, October 2012 A White Paper from Laird Technologies IEEE and industry standards
More informationBest Practices for Deploying Web Services via Integration
Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.
More informationSurvey/Overview: Australian IT Service Provider Market
Markets, J. Longwood, M. Chon, R. Jester Research Note 15 April 2003 Survey/Overview: Australian IT Service Provider Market Market scans are used in sourcing strategy development and fast-track processes
More informationDISRUPTIVE TECHNOLOGIES IN THE DATACENTER
DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and
More informationOptimize Your Broadband WAN
Technology, G. Johnson Research Note 15 September 2003 Optimize Your Broadband WAN When migrating from narrowband to broadband WANs, be aware that TCP's limitations can severely affect network performance,
More informationThe Growing Impact of Mobile Messaging
The Growing Impact of Mobile Messaging An Osterman Research White Paper Published November 2007 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1
More informationMobile Terminals: Western Europe, (Executive Summary) Executive Summary
Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationA POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering
Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,
More informationCisco Meraki. Spectralink VIEW Certified Configuration Guide
Spectralink VIEW Certified Configuration Guide Cisco Meraki Meraki Cloud-Controlled APs MR26, MR30H, MR32, MR33, MR34, MR42, MR52, MR53, MR72, MR74, MR84 721-1013-000 Rev: A August 2017 Copyright Notice
More informationFeature. What exactly is WLAN? More reading:
The WLAN Roadmap Wireless Local Area Networking (WLAN) is a simple concept, but one that entails a wide, sometimes confusing, variety of standards, implementations, and future plans for development. This
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationThe Business Communications Landscape Is Ripe for Massive Disruption
THOUGHT LEADERSHIP The Business Communications Landscape Is Ripe for Massive Disruption MAY 2017 Raul Castanon-Martinez, Senior Analyst, Workforce Collaboration and Communications Business communications
More informationOvercoming Concerns about Wireless PACs and I/O in Industrial Automation
Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Industrial Automation Flirts with Wireless The automation industry increasingly finds wireless attractive, and for several reasons.
More informationPush-to-Talk Brings Voice-Based Instant Messaging to Europe
Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young
More informationDallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters
MARKET FORECAST JUL 2016 Dallas Multi-Tenant Datacenter Market Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the Dallas
More informationLessons Learned from SD-WAN Deployments on Six Continents. 21 September 2016 Tim Sullivan Co-founder & CEO
Lessons Learned from SD-WAN Deployments on Six Continents 21 September 2016 Tim Sullivan Co-founder & CEO Coevolve s perspective on SD-WAN Coevolve was established in 2014 to drive enterprise adoption
More informationCisco WAP121 Wireless-N Access Point with Single Point Setup
Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity
More information802.11ac FREQUENTLY ASKED QUESTIONS. May 2012
802.11ac FREQUENTLY ASKED QUESTIONS May 2012 Table of Contents General Questions:... 3 1. What is 802.11ac?... 3 2. When will 802.11ac be ratified into a standard?... 3 5. Will 802.11ac come out before
More informationGet Ready for the Revival of Large Data Centers
Research Publication Date: 4 August 2006 ID Number: G00142079 Get Ready for the Revival of Large Centers Rakesh Kumar Although large data centers declined in importance in recent years, they will return
More information