Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Enterprise WLAN market still on the rise in Q2 2018
The combined consumer and enterprise WLAN market segments rose 1.9% year over year in the second quarter of 2018.
Interview: Aruba's new security offering, changing partner ecosystem
Hewlett Packard-owned network infrastructure provider Aruba has announced a stronger focus on user experience and cloud enablement.
Allied Telesis releases first WLAN hybrid solution for enterprise
The Channel Blanket hybrid wireless solution delivers multi- and single-channel WLAN capabilities simultaneously using a single access point design.
Home and small offices will drive WLAN growth to $18b by 2022
Dell’Oro group research has shown that the WLAN market will continue to grow in the near future, driven by small home and small office needs.
Enterprise WLAN market keeps steady growth pace in Q1
Enterprise wireless local area network (WLAN) across the globe have continued to rise during Q1 2018, continuing a steady growth rate from 2017.
HPE NZ sees huge admin savings within 65% profit drop
HPE spun off their Enterprise Services offering in a bid to save money. Now they have released their financials we can see how it has worked out.
Cisco and Aruba-HPE named WLAN leaders in IDC report
IDC published a new vendor assessment that profiles 11 vendors in the worldwide enterprise WLAN market.
Ruckus helps end-users get IoT together with new offering
Ruckus has introduced a suite that can consolidate disparate IoT networks to deliver secure IoT deployments to enterprises and organisations.
Cisco dominates resurgent Indian networking market
Cisco has snapped up the WLAN market lead in India, adding to its dominant position in the Ethernet switch and router markets.
IDC: Traditional carriage connectivity to stale in AU as SDN takes over
The enterprise connectivity market in Australia is on the verge of becoming significantly more software-defined according to IDC.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?