devices

Results 1426 - 1450 of 1646Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Learn how Under Armour performs patch management, provides Mac and iOS device support and creates reports for business critical data.
Tags : 
apple, devices, patch management, ios, support, end user
    
Absolute Software
Published By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : 
data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server, backup servers, data transfer, alacritech
    
Alacritech
Published By: Schneider Electric     Published Date: Feb 12, 2018
Technology is infiltrating K-12 classrooms at a rapid clip as educators find new ways to employ computing devices and online resources to improve education and learning. Overall, the global market for education-related technology, services and content is expected to grow from $193 billion in 2016 to $586 billion in 2021, a compound annual growth rate of nearly 25%, according to the market research firm Research and Markets.
Tags : 
    
Schneider Electric
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing, software license, compliance, appsense
    
AppSense
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
GroundWork has integrated best of breed open source tools, including Nagios 2.0, RRDtool, and MySQL with GroundWork-developed open source projects into a comprehensive suite for monitoring your entire IT infrastructure including servers, applications, and network devices. Download this white paper to learn more.
Tags : 
open source, open view, openview, network monitoring, infrastructure monitoring, monitoring, infrastructure, linux, unix, groundwork, groundwork open source
    
Groundwork Open Source
Published By: IBM     Published Date: Mar 04, 2009
Nutra-Flo case study that shows cost reduction and increased productivity - team members can carry this capability with them on mobile devices, so they can stay connected with colleagues via instant messaging even when in the field. Lotus Sametime Web conferencing, Nutra-Flo can save travel costs to the Asia Pacific region. Web conferencing allows us to stay in touch with partners around the world without being there in person.
Tags : 
ibm, lotus software, nutra-flo, cost reduction, web conferencing, lotus sametime, instant messaging, mobile communication, collaboration, rss, blogging, lotus notes, domino 8
    
IBM
Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect
Published By: Meru Networks     Published Date: Aug 21, 2009
Universities and colleges are among the most aggressive adopters of Wi-Fi technology. The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher education campuses fertile ground for wireless LANs.
Tags : 
university, college, wi-fi, wifi, wlan, education, institution, wireless lan, wireless lans, dormitory, dorm wifi, dorm wi-fi, meru, meru networks
    
Meru Networks
Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security, network security, pointsec
    
Pointsec
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec
    
Pointsec
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec
    
Pointsec
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage, storage comparison, spectralogic, spectra logic
    
Spectra Logic
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile, sybase
    
Sybase
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase
    
Sybase
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo, home networking, texas intruments
    
Texas Instruments
Published By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : 
quocirca, service management, high availability
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps), service portal
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access, web service security, internet security, landesk
    
LANDesk
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking, financial, mobile banking, provenir
    
Provenir
Published By: Palm, Inc.     Published Date: Mar 15, 2007
Smartphones and other handheld devices support government continuity of operations (COOP) by enabling its central tenets: decentralization and redundancy. Read this white paper to learn all benefits of using smart phones when an emergency strikes.
Tags : 
government, disaster recovery, disaster, terrorism, terrorist attacks, smartphone, smart phone, pda, handheld, wireless, mobile computing, palm
    
Palm, Inc.
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: