devices

Results 1601 - 1625 of 1774Sort Results By: Published Date | Title | Company Name
Published By: Intermec     Published Date: Sep 07, 2011
In this white paper, learn why emerging enterprise applications require ruggedness and reliability.
Tags : 
intermec, smart phones, reliability, handheld devices, ip ratings, drop ratings
    
Intermec
Published By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : 
intermec, tablet, computing, ipad, computers, compatibility
    
Intermec
Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg, martyn davies, mobile and wireless, mobile security, mobile wireless, rasib hassan khan, smartphones
    
Focus
Published By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : 
igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
    
Korenix Technology
Published By: SAS     Published Date: Apr 16, 2015
The large array of connected devices, often referred to as the “Internet of Things” (IoT), is delivering an array of new data from the sensors they contain. This data offers the promise of new services, improved efficiency and, possibly, more competitive business models.
Tags : 
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
As the pace of business continues to accelerate, forward-looking organizations are beginning to realize that it is not enough to analyze their data; they must also take action on it. To do this, more businesses are beginning to systematically operationalize their analytics as part of a business process. Operationalizing and embedding analytics is about integrating actionable insights into systems and business processes used to make decisions. These systems might be automated or provide manual, actionable insights. Analytics are currently being embedded into dashboards, applications, devices, systems, and databases. Examples run from simple to complex and organizations are at different stages of operational deployment.
Tags : 
best practices, embedding analytics, technology, data, operational analytics
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
A paradigm shift is underway in the cybersecurity industry. Cybersecurity professionals are moving from a focus on attacker prevention to attacker detection. Preventing the “bad guys” from getting in is still important, but cyber adversaries are increasingly able to bypass even the most sophisticated network defenses. Once inside, it is more important than ever to find these attackers fast, before their activities get buried in the daily volume and pulse of network communications. This is where security analytics holds promise. Security analytics provides the necessary and timely visibility into normal and abnormal network behavior. This visibility enables devices and entities acting suspiciously to be quickly identified and investigated.
Tags : 
cyber security, security, best practices, attacker prevention, paradigm shift, security analytics, technology
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
The Internet of Things (IoT) – devices and sensors connected to computing systems and networks – has received enormous attention in the last few years. The attention is due, in part, to the proliferation of connected devices, from about a million in the early 1990s to more than five billion today. In addition, the technology for connecting the devices has become more affordable and easier to integrate. The result is that IoT is helping to digitize more and more business processes, from the factory floor to tracking shipments across oceans. Digitized processes are providing a continuous stream of digital data. By analyzing the data stream, businesses can refine their processes by better understanding how those processes are performing, identifying possible issues sooner and uncovering areas for improvement.
Tags : 
best practices, technology, data, competitive advantage, data stream, digitized process
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: ScriptLogic     Published Date: Jan 11, 2012
Discover hardware and software inventory data on Windows and Mac devices and compare it to what has been purchased as well as what is actually in use.
Tags : 
    
ScriptLogic
Published By: Okta     Published Date: Apr 29, 2015
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.
Tags : 
mobile, mobile workforce, okta, security
    
Okta
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Okta     Published Date: May 07, 2015
If you're migrating from an existing on-premise Exchange environment — or setting up Office 365 for a new set of users — you'll need to address how to handle users accessing Office 365 from mobile devices. Read this eGuide now to discover how you can simplify the migration and deployment process around Office 365 to mobile devices.
Tags : 
office 365, mobility, apps, data, administration, okta
    
Okta
Published By: Apptus Mobile     Published Date: Oct 14, 2010
An overview of how to develop education modules for mobile devices
Tags : 
smartphone, smart phone, mba, education, mobile, higher education, research
    
Apptus Mobile
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Movidius     Published Date: Jan 10, 2011
This whitepaper outlines methods for creating high quality HD 3D images and shows the potential of 3D as a new standard for mobile devices
Tags : 
mobile, autostereoscopic, parallax, convergence
    
Movidius
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
In today's hyper-connected world, with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms, people expect immediate access to information and services.
Tags : 
autonomic management, storage, service, virtualization, automation, standardization, consolidation, internal services, external services, it service, multi-tenancy, federation, efficiency, flexibilty, agility, utiity storage
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : 
client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data, outsourcing, work from home, branch, endpoint devices, firewall, vpn, stacking links
    
HP and Intel® Xeon® processors
Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus
    
Avocent
Published By: Citrix Systems     Published Date: Oct 08, 2012
Today's organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working with demanding high-end applications, to task workers performing standard, relatively predictable processes. A one-size-fits-all approach to desktop virtualization cannot meet all the different requirements of these users.
Tags : 
citrix, desktop, virtualization, shared desktop, remote pc
    
Citrix Systems
Published By: Citrix Systems     Published Date: Oct 08, 2012
Desktop virtualization helps organizations support business priorities that are crucial for growth. By freeing people to work in more places, on more devices, the organization can offer a more attractive work experience to recruit and retain the best candidates and empower them to do their best work.
Tags : 
citrix, desktop, virtualization, it structure, data
    
Citrix Systems
Published By: BMC     Published Date: Jan 09, 2012
The complexity of cloud computing warrants a unique approach to planning. See how BMC can help!
Tags : 
cloud computing, bmc, planning, initiative, computing, transition, budget, silos, virtualized, servers, network devices, storage, hardware, infrastructure, control
    
BMC
Published By: LogMeIn     Published Date: Mar 01, 2012
The best practices offered in this white paper will help streamline IT's time, budget, and the support it offers to keep end users working effectively and successfully.
Tags : 
mobile devices, mobile support, customer satisfaction, customer service, wireless devices, wireless phone
    
LogMeIn
Published By: AMD FirePro     Published Date: Apr 18, 2012
Help optimize the performance of your current workstation with the Solidworks special edition of "Workstation Tuning Guide" in association with Develop 3D.
Tags : 
advanced micro devices, amd, firepro, solidworks, 2012, engineering, optimization, optimisation, certification, designers, engineer, visualization
    
AMD FirePro
Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.