access

Results 2576 - 2600 of 2627Sort Results By: Published Date | Title | Company Name

Wi-Fi Resident Safety Case Study: Benchmark Senior Living

Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Founded in 1997, Benchmark Senior Living is the largest senior living provider in New England. The community in Shelton, Connecticut is just a short drive from the Connecticut coastline—the Split Rock community is home to about 50 assisted living and memory care residents. In addition to being a LEED-certified facility, Split Rock also exemplifies Benchmark Senior Living’s goal to leverage technology to enrich the lives of residents. To that end, the facility incorporates a range of communication technologies to promote engagement with family and the community. Read this case study to learn about how Benchmark Senior Living selected an integrated solution from STANLEY Healthcare and STANLEY Security encompassing emergency call from portable pendants and fixed call points, wander management, environmental monitoring and access control to improve resident's lives.
Tags : 
healthcare, resident safety, senior living, assisted living, locating system, wi-fi
    
STANLEY Healthcare

Wie Sie Ihr hybrides Unternehmen auf kostengünstige Art vor Sicherheitsverletzungen

Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA

Wiegand Security Compromised

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.

WiFi Evolution Drives the Need for Multigigabit Networks

Published By: Cisco     Published Date: Feb 23, 2016
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked— first, finding a wired port to use for high-bandwidth applications, such as video or streaming media, and then shifting to wireless connections when the need to be mobile was more important than having the performance of wired.
Tags : 
wireless connection, business practices, applications, connectivity, wireless, bandwidth management, network management, network performance, network performance management
    
Cisco

Wikibon Research Report: Halving Downtime Costs for Mission Critical Apps

Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle

WiMAX Remote Cabinet Solutions

Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch

Windows 7 Migrations and Beyond: How to Ensure Successful OS Migrations while Boosting Production

Published By: RES Software     Published Date: Apr 05, 2013
IT organizations are on the brink of a new wave of desktop transformation, with Windows 7 operating system (OS) migrations a critical stop on the journey. These OS migrations are extremely complex and pose real risks in terms of end user downtime, business interruptions, and increased costs. IT needs to ensure migration projects go quickly and smoothly, and that the resulting user environment becomes easier to access and manage.
Tags : 
desktop evolution, enterprise-wide desktop evolution, infosys, boosting user production, prevent downtime, prevent business interruptions
    
RES Software

Windows Mobile 6.5: Enabling business mobility, today and tomorrow

Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications, mobile computing, mobile workers, smart phones, wireless application software, wireless phones, ebusiness, windows
    
Microsoft Windows Phone

Windows Vista Misunderstood Security Breach

Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control, security, windows
    
Netwrix

Winning the Omni-channel retail race

Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS

Wireless for a New World

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise

Wireless for a new world

Published By: Alcatel Lucent Enterprise     Published Date: Sep 07, 2017
The networks that support this free-moving, agile world need the same kind of distributed intelligence. Revolutionary distributed control places intelligence in the access point, allowing automatic optimization of coverage and bandwidth. With contractors on site, and employees using their own devices, future-ready networks must support all kinds of devices, including legacy equipment. Airtime fair access provides optimal connectivity, even for older devices.
Tags : 
wi-fi, technology, wireless, mobile devices, innovation, organizations, hr professionals, workforce
    
Alcatel Lucent Enterprise

Wireless Networking Five Questions to Start With

Published By: Cisco     Published Date: Jan 29, 2009
Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.
Tags : 
cisco, wireless networking, productivity tool, mobile workforce, router capacity, access point, secure network, control systems, wireless tips, wireless, network security, mobile computing, mobile data systems, mobile workers, wireless infrastructure, wireless security, wlan
    
Cisco

Wireless networks: Turning raw speed into great experiences

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise

Wireless Technology Migration: Mitigating Risk and Increasing Supply Chain Efficiency

Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies, wireless
    
PEAK Technologies, Inc.

Wireless Voice in the Office Environment

Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation, wireless, authentication
    
Plantronics

With Data Breaches on the Rise, HP Point of Sale Systems Offer Protection

Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.

With technology, we work at super speed. So why shouldn’t your Wi-Fi?

Published By: Ruckus Wireless     Published Date: Jul 11, 2018
With Ruckus Cloud Wi-Fi, you get better, more consistent performance for end users. Ruckus access points have been proven to support 30-50% more clients without a performance penalty. Choose high performance, high density-capable access points that lower your total cost of ownership, now and in the long-term.
Tags : 
    
Ruckus Wireless

With the Right Infrastructure, the Cloud Can Reign

Published By: HP     Published Date: Aug 03, 2009
Despite all the excitement about clouds, only a handful has yet been built, mostly because infrastructure is such a challenge. Before cloud-type systems can bloom, businesses need ready access to the kind of infrastructure Google had to cobble together itself: high scale, low-cost and mass customized. Read this online article to learn how these extreme scale-out infrastructures will not only seed clouds, but nourish Web 2.0 and high-performance systems while inspiring business models we can't yet imagine.
Tags : 
infrastructure, cloud computing, networking
    
HP

WLAN Security – Balancing Flexibility and Control

Published By: Aerohive     Published Date: Sep 25, 2015
Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, infrastructure, network security, internet security, security management, mobile computing, wifi, wireless infrastructure, wireless security, wlan, cloud computing
    
Aerohive
Start   Previous    92 93 94 95 96 97 98 99 100 101 102 103 104 105 106    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.