device environment

Results 51 - 75 of 129Sort Results By: Published Date | Title | Company Name

2018 Motorola Solutions Energy Communications Survey Report

Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s increasingly mobile world, Energy workers require instant communication and access to data intelligence wherever the job may take them. From the oil rig to the electric grid and everywhere in between, having the right data, in the right hands, at the right time, no matter the environment or device of choice — is simply non-negotiable. Organizations across various Energy segments — oil & gas, electric utilities, water utilities, and mining — are currently juggling a mix of communication devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. Yet, citizens rely on their homes being heated in the winter, on clean running water, and on lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for Energy workers day-in and day-out. So oil & gas workers can communicate safely in hazardous environments. So precious resources are
Tags : 
    
Motorola Solutions

Transportation and Logistics: Communications Buying Guide

Published By: Motorola Solutions     Published Date: Apr 26, 2019
When it comes to enhancing worker safety, boosting productivity and streamlining operations, communication matters. Organizations across various industry segments — trucking, rail, airlines and airports, and warehousing/distribution — are juggling a mix of communication devices and hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions.
Tags : 
    
Motorola Solutions

Going Beyond Radio with Motorola Solutions

Published By: Motorola Solutions     Published Date: May 21, 2019
When it comes to worker safety, efficiency and production, nothing is faster than right now. Organizations across various energy segments — oil, gas, petrochemical, electric utilities, water utilities and mining — are currently juggling a mix of communications solution devices and are hindered by gaps in coverage, poor battery life and fragile equipment that cannot withstand harsh environmental conditions. The power of now puts instant communications at your workers’ fingertips — because when communication slows, operation slows. Citizens rely on their homes being heated in the winter, clean running water and lights that turn on when they flip the switch. Meeting these expectations requires reliable, clear voice and data communications for energy workers day-in and day-out. So workers can communicate safely in hazardous environments. So precious resources are not wasted and efficient operations are maintained. So energy companies can continue to exceed expectations. Unified communicati
Tags : 
    
Motorola Solutions

Mind the Gap: A Roadmap to IT/OT Alignment

Published By: Indegy     Published Date: Jul 29, 2019
Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber- security threats even more difficult to detect, investigate and remediate.
Tags : 
    
Indegy

The Indegy Industrial Cyber Security eBook

Published By: Indegy     Published Date: Jul 29, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
    
Indegy

DoD Case Study: US Department of Defense Commits to Upgrade 4 Million Seats to Windows 10

Published By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
    
Microsoft Windows

Case Study: J.R. Simplot Data Center Refurbishment

Published By: Raritan Inc.     Published Date: Aug 04, 2010
This Case Study explores how they installed energy management software and intelligent rack PDUs with outlet-level power monitoring to add remote energy management, power monitoring of individual devices, environmental monitoring, and sophisticated and accurate power usage reports and analytics.
Tags : 
raritan, power, processing, energy management, data center efficiency, power management, instrumentation, green
    
Raritan Inc.

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas
    
Entrust Datacard

BIG-IP Live Install and Logical Volume Manager

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production
    
F5 Networks Inc

Defend Hidden Mobile Web Properties

Published By: Citrix Systems     Published Date: Nov 10, 2014
We’ve all come to expect the same security, performance and reliability from our mobile applications as we do with native applications. But these apps don’t just run on our mobile devices. They are powered by a variety of backend infrastructure – a hidden but important layer of application components and network devices. NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading our full report, Defend Hidden Mobile Web Properties (link).
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems

Business Phone Buying Guide: Selecting the Right Phone for Your Workspace

Published By: Polycom     Published Date: Mar 13, 2018
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: Guidance on selecting devices for different workspaces Information on the newest collaboration features and benefits Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom

In-Vehicle Network Best Practices Installation Guide

Published By: CradlePoint     Published Date: Sep 04, 2014
The automotive environment can be particularly harsh for electrical equipment such as routers and mobile devices. Power in automotive systems is not stable and is often subject to fluctuations and noise. This paper will provide background on the problems and solutions as well as guidance for the installation of CradlePoint devices. We’ll recommend some commercially available products to help minimize the effects of the harsh automotive power environment.
Tags : 
cradlepoint, unstable power in automotive systems, harsh automotive power environment, data management
    
CradlePoint

White paper: Health Care Device Trends

Published By: Fujitsu     Published Date: Sep 02, 2016
Download this white paper today to better understand how devices are going to be used in the health care environments and how you can adjust your product plans accordingly.
Tags : 
fujitsu, mobile device, healthcare device, mobile computing, tablets, smartphones, mobile workers, remote access
    
Fujitsu

Clinical Mobility: Strategy, Best Practices and Device Selection

Published By: Zebra Technologies     Published Date: Jun 15, 2017
Mobile devices help clinicians improve the quality of patient care and save lives by improving staff communication and collaboration, and by providing instant access to a wealth of mission-critical information — from real-time lab results to a change in a patient’s condition or verification of the “5 rights” of medication administration at the patient bedside. In addition, mobility also helps healthcare organizations comply with important governmental and regulatory safety standards, without tasking an already overburdened nursing staff with additional paperwork. This white paper provides guidance for planning and implementing a clinical mobility solution in today’s healthcare environment, including a five-step roadmap to help key stakeholders identify needs.
Tags : 
clinical, mobility, strategy, best practices, device, save lives
    
Zebra Technologies

Enabling Bring Your Own Device

Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management
    
Cisco

Installing Microsoft Windows Server 2008 Drivers on Dell PowerEdge Servers

Published By: Dell Windows Server     Published Date: Jan 16, 2009
Upgrading Dell PowerEdge™ servers to the Windows Server 2008 OS also typically requires selecting, installing, and troubleshooting device drivers. Using tested and validated drivers and following best practices can help administrators ensure optimal performance in their environments.
Tags : 
dell, microsoft windows server 2008, poweredge servers, dell poweredge, troubleshooting device drivers, driver installations, platforms, windows
    
Dell Windows Server

Simple IPsec for Embedded Devices

Published By: Mocana     Published Date: Jun 18, 2010
Learn how Mocana's NanoSec can speed your product development cycle while providing best-in-class device security for resource-constrained environments. Download the product whitepaper and receive a free trial.
Tags : 
mocana, nanosec, ipsec, embedded devices, product development cycle, device security, authentication, system on a chip
    
Mocana

WPA2 Security Solutions Allows OEMs to build Highly Scalable Security

Published By: Mocana     Published Date: Jun 18, 2010
Until recently, designing or building a wireless device meant cobbling together whatever security implementations you could find, often with open source and other code that is usually too big and too slow for device environments.
Tags : 
mocana, nano wireless security, wpa2, device developer, open source code, wireless application software, wireless infrastructure, wireless security
    
Mocana

SSL Custom-Built for Device Environments

Published By: Mocana     Published Date: Jun 22, 2010
Mocana's NanoSSL is a comprehensive SSL solution designed for efficiency and high performance in embedded and resource-constrained environments. Download the NanoSSL whitepaper and receive a free trial.
Tags : 
mocana, nano ssl, device environment, tls, security services, certificate management, open source, ssl
    
Mocana

SSH Toolkit Designed Specifically for Embedded Devices

Published By: Mocana     Published Date: Jun 22, 2010
Learn how Mocana's NanoSSH can speed your product development while providing best-in-class SSH services custom-built for device environments. Download the NanoSSH whitepaper and receive a free trial.
Tags : 
mocana, nano ssh, embedded device, product development, encryption, database development, system on a chip, embedded systems and networking
    
Mocana

Three Things Your Field Service Organization Needs to Know About IoT

Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
The Internet of Things (IoT) is connecting our world in ways that were unimaginable 10 years ago—collecting data on everything we do and using it to streamline our daily activities. In doing so, IoT is changing the way that consumers think about service. Service organizations must be prepared to support these new customer expectations to ensure continued satisfaction to strengthen and foster loyalty. Additionally, IoT is making its way into the enterprise, especially among organizations in industries like utilities, oil and gas, medical devices, manufacturing and telecommunications. Connected devices enable more efficient processes for maintenance and repair by constantly providing information on machines’ performance, environmental conditions, and possible failures. For example, a connected washing machine in a customer’s home could automatically send out an error report to the manufacturer when it experiences a failure. This is where field service management comes in.
Tags : 
oracle, service cloud, service management, customer interaction, internet of things, application integration, best practices, business activity monitoring
    
Oracle Service Cloud

Agile and Secure Desktop Delivery with Amazon WorkSpaces

Published By: AWS     Published Date: May 09, 2018
More and more businesses are embracing workplace mobility and bring-your-own-device (BYOD) strategies as a method to reduce costs and stimulate productivity. These initiatives give employees, contractors, and business partners the power to remotely contribute, collaborate, and communicate with team members from familiar devices, anywhere around the world. To implement these strategies effectively however, IT teams must provide access to applications, business systems, collaboration platforms, and development environments without sacrificing end-user experiences, hindering their organization’s security posture, or inducing excessive costs. What many are finding is that traditional methods of desktop and application delivery and on-premises Virtualized Desktop Infrastructure (VDI) often cannot live up to this task, as they introduce new challenges upon implementation.
Tags : 
    
AWS

IT Security by the Numbers: Calculating the Total Cost of Protection

Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications
    
Kaspersky Lab

BYOD Policy Implementation Guide

Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
Absolute Software

Storage Virtualization - The Next Step in controlling Spiraling Costs

Published By: Dell Storage     Published Date: Jan 16, 2009
Although hardware storage prices have come down, storage administration and software expenses still run about seven times the cost of storage hardware. Storage consolidation provides a partial solution by expanding device connectivity and reducing points of management. However, once storage is consolidated, the job is only half done. You still need a centralized, flexible method of management that masks the complexity of the storage environment and reduces administrative overhead. That’s where virtualization fits in.
Tags : 
dell, storage virtualization, hardware storage, storage administration, software expenses, storage consolidation, storage environment, virtualization
    
Dell Storage
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.