Number of WLAN implementations doubled in a year, says report
Number of WLAN implementations doubled in a year, says report
By Semiconductor Business News
August 1, 2002 (8:39 a.m. EST)
URL: http://www.eetimes.com/story/OEG20020801S0017
BOSTON, Mass. -- The number of WLAN implementations has doubled over the past year while wide-area wireless data initiatives have stagnated, according to a report from market research company The Yankee Group. The report also states that approximately 1 million wireless local-area network (WLAN) access points are used by over 700,000 enterprises including 11,000 large establishments. "In most cases, enterprises should decide on WLAN deployments based on the value of the network for its internal utility, viewing the public WLAN opportunity as 'gravy' unless, of course, some third-party service provider is willing to install the infrastructure for free,” said Adam Zawel director of wireless/mobile enterprise and commerce research at Yankee Group, in a statement.
Related Semiconductor IP
- Ultra Ethernet MAC & PCS 100G/200G/400G/800G
- Ethernet PCS 100G/200G/400G/800G/1.6T
- Ethernet MAC 100G/200G/400G/800G/1.6T
- Junction Over-Temperature Detector with Linear Centigrade-to-Voltage Output - X-FAB XT018
- Performance P570 Gen 3
Related Articles
- How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems
- Fault Injection in On-Chip Interconnects: A Comparative Study of Wishbone, AXI-Lite, and AXI
- Pipeline Stage Resolved Timing Characterization of FPGA and ASIC Implementations of a RISC V Processor
- MEMS market to grow 75-87% over five-year period, says report
Latest Articles
- Closer in the Gap: Towards Portable Performance on RISC-V Vector Processors
- TTP: A Hardware-Efficient Design for Precise Prefetching in Ray Tracing
- Heterogeneous SoC Integrating an Open-Source Recurrent SNN Accelerator for Neuromorphic Edge Computing on FPGA
- A Reconfigurable Multiplier Architecture for Error-Resilient Applications in RISC-V Core
- ObfAx: Obfuscation and IP Piracy Detection in Approximate Circuits