devices

Results 1726 - 1750 of 1811Sort Results By: Published Date | Title | Company Name

Windows Terminal Server Software Licensing Control

Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing
    
AppSense

Gain Advanced Visibility and Control of your IT Infrastructure

Published By: Groundwork Open Source     Published Date: Aug 21, 2009
GroundWork has integrated best of breed open source tools, including Nagios 2.0, RRDtool, and MySQL with GroundWork-developed open source projects into a comprehensive suite for monitoring your entire IT infrastructure including servers, applications, and network devices. Download this white paper to learn more.
Tags : 
open source, open view, openview, network monitoring, infrastructure monitoring, monitoring, infrastructure, linux
    
Groundwork Open Source

iDirect Network Accelerators

Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect

Wireless LANs in Higher Education

Published By: Meru Networks     Published Date: Aug 21, 2009
Universities and colleges are among the most aggressive adopters of Wi-Fi technology. The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher education campuses fertile ground for wireless LANs.
Tags : 
university, college, wi-fi, wifi, wlan, education, institution, wireless lan
    
Meru Networks

The Mobile Workforce: The Weakest Link

Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security, network security, pointsec, wireless
    
Pointsec

Enterprise Security for Mobile Computing Devices

Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
    
Pointsec

Guide for Securing Federal Telework

Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom
    
Pointsec

Removable Storage Technologies: A Comparative Overview

Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage
    
Spectra Logic

Best Practices for Mobile Application Architectures

Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile
    
Sybase

Compliance in the Mobile Enterprise

Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security
    
Sybase

Embedded WLAN Delivers Rich Content Anywhere, Anytime

Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo
    
Texas Instruments

Embedded Tech Paper: Learn How to Create Effective GUIs

Published By: Mentor Graphics     Published Date: Aug 19, 2009
In today’s competitive embedded markets, manufacturers need to find ways to differentiate without adversely impacting development time and cost. This is particularly true in relation to embedded devices that are designed for use by consumers. As such products become more sophisticated, user interaction via traditional switches, dials, and basic displays becomes less desirable for a number of reasons.
Tags : 
mentor graphics, embedded markets, switches, dials, display, user interface, graphical user interface, gui
    
Mentor Graphics

Threat Vector Series - Endpoint Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
McAfee Inc

Removing the complexity from information protection

Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management, internet security
    
Quocirca

Understanding High Availability for the BlackBerry Enterprise Server

Published By: BlackBerry     Published Date: Jul 23, 2009
Over the last fifteen years, mobility solutions have evolved from cell phones and pagers to platforms for wireless email and mobilizing business applications. Today's road warriors depend on their mobile devices for fast, reliable, easy access to applications and corporate data. Mobile solution downtime can adversely affect customer service, productivity, sales, and revenues.
Tags : 
blackberry, mobile applications, cio, availability, pim, voip, smartphones, it communication
    
BlackBerry

Capitalizing on Digital Media in the Age of Transparency, Social Networking and the 24/x News Cycle

Published By: The FeedRoom     Published Date: Jul 22, 2009
Social media, blogs and the proliferation of mobile devices have dramatically altered the corporate communications landscape. It's no longer a question of whether your PR team should get involved, but rather how to get involved and what digital media practices will best serve your goals.
Tags : 
youtube, twitter, myspace, linkedin, social networking, blog, blogs, wiki
    
The FeedRoom

The Mobile Advertising Opportunity: 10 Times Better Results than Online

Published By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : 
iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry
    
AdMob

Application Ready Solution Templates

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
F5's Application Ready Solution Templates are designed to ensure that the savings realized through consolidation are protected by reducing the time, effort, and application-specific knowledge required of administrators to optimally deploy applications that are secure, fast, and available through the use of BIG-IP devices.
Tags : 
application, solution, template, design, device, administrator, knowledge, ease
    
F5 Networks Inc

BIG-IP Live Install and Logical Volume Manager

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production
    
F5 Networks Inc

Optimizing the Business of IT

Published By: F5 Networks Inc     Published Date: Jul 08, 2009
New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.
Tags : 
big-ip, big-ipv10, resource, functionality, domain, administrative, application, function
    
F5 Networks Inc

How Ruggedness Reduces TCO for Mobile Computers

Published By: Intermec     Published Date: Jun 16, 2009
General-purpose PDAs and ruggedized enterprise mobile computers serve different markets and functions, and also vary by size, weight and materials. But the biggest difference is their total cost of ownership (TCO).
Tags : 
tco, total cost of onwership, pda, enterprise mobile computers, vdc, mobile devices, productivity, power management
    
Intermec

Guide to IT Search: Managing the Modern Data Center

Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure
    
Splunk Inc.

Nucleus Graphics: A New Approach to User Interface Creation for Consumer Electronic Devices

Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market
    
Mentor Graphics

Successful Mobile Deployments Require Robust Security

Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication
    
BlackBerry

Pushing it to the streets

Published By: BlackBerry     Published Date: May 11, 2009
Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and BlackBerrys in the field.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.