Article DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Article Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Data Security
 •   Virtualization
 •   Network Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Network Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Networks

Related Searches
 •   Article Devices Learning
 •   Article Devices Suite
 •   Article Industry
 •   Article Statements
 •   Benefits Article Devices
 •   Diagram Article Devices
 •   Layer Article Devices
 •   Measure Article Devices
 •   Parts Of Article Devices
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Gartner: Deploying iPads on the corporate network by ComputerWeekly.com

March 16, 2012 - (Free Research)
Tim Zimmerman, Gartner research director offers some practical advice to organisations wanted to use iPads on their corporate wireless networks. 
(ANALYST BRIEF) READ ABSTRACT |

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.

October 31, 2012 - (Free Research)
In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success. 
(WHITE PAPER) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 31, 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 01, 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Server Optimization, Hardware and Virtualization by Dell, Inc. and Microsoft

January 09, 2012 - (Free Research)
In this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative. 
(EGUIDE) READ ABSTRACT |

The future of digital forensics by ComputerWeekly.com

April 10, 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

More Than Nothing, a Zero Client Simplifies the Desktop by SearchVirtualDesktop.com

February 28, 2014 - (Free Research)
In this article, you'll find a detailed examination of what zero clients are, how they work, what their primary benefits might be and where their key limitations are to be found. 
(EBOOK) READ ABSTRACT |

Network Evolution: Building the Infrastructure to Enable the Changing Face of IT by OnX USA LLC

April 02, 2012 - (Free Research)
This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets. 
(EZINE) READ ABSTRACT |

Premier Issue of the CIO Decisions Midmarket Ezine - "The Green Monster" by CIO Decisions

June 2008 - (Free Research)
This document highlights what you need to know about power consumption, server virtualization and outfitting data centers to make the most of the new technologies. 
(EZINE)

Trends to Watch: Customer Experience and Interaction by Oracle Corporation

October 2013 - (Free Research)
The following article details how technologies are evolving to meet new customer demands, and providing recommendations for both enterprises and vendors. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Enterprise Mobility Guide 2011 by Sybase, an SAP company

May 2011 - (Free Research)
Mobile apps and tablets are transforming enterprises across the globe right now. How can you be sure you're staying ahead of the curve while increasing productivity and enhancing customer satisfaction? Get the The Enterprise Mobility Guide 2011. 
(WHITE PAPER) READ ABSTRACT |

Tech Guide: Desktop Virtualization and the Network by Dell, Inc.

February 2012 - (Free Research)
Discover the impact desktop virtualization and virtual desktop infrastructure have on your network. 
(EGUIDE) READ ABSTRACT |

Sleeping Android: the danger of dormant permissions by ComputerWeekly.com

March 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Mobile Optimization – It’s Now or Never by AT&T Corp

September 2011 - (Free Research)
Read this article to discover best practices for creating a a consumer-friendly, mobile shopping experience. 
(WHITE PAPER)

Defining Your Corporate Mobile Policies by BlackBerry

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Secure Web Gateway Deployment Methodologies by BlueCoat

September 2010 - (Free Research)
In this article, we’ll talk about the four most common types of Web gateway network deployments. Sometimes referred to as forward proxies, these devices are used to secure Web access for an organization’s internal end users. 
(WHITE PAPER) READ ABSTRACT |

Big Data Gets Personal by SAP America, Inc.

January 2014 - (Free Research)
In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise. 
(WHITE PAPER) READ ABSTRACT |

Configuring Systems for High Bandwidth I/O by Sun Microsystems, Inc.

May 2009 - (Free Research)
This Sun BluePrints™ article describes a recipe for configuring systems to support the very high bandwidth I/O capabilities needed by data-intensive applications. 
(WHITE PAPER) READ ABSTRACT |

The Internet of Things: A Game of Two Halves by Hewlett-Packard Company

January 2014 - (Free Research)
This article explores the business impact of the Internet of Things. Read on to learn what the increased connectivity of objects and services means for CIOs and data analytics. 
(ANALYST REPORT) READ ABSTRACT |

SAPinsider article - Meet the needs of the "Mobile Anywhere" generation by Hewlett-Packard Company

March 2012 - (Free Research)
How do you get started on a mobility project? Access this helpful resource to learn how mobile application services for SAP enable you to easily simplify your applications, extend them where necessary, and build new apps with preconfigured development and security frameworks. 
(WHITE PAPER) READ ABSTRACT |

The New CRM Metrics: Putting Them to Work by SearchCRM

January 2013 - (Free Research)
There is added pressure for contact center agents, with customers armed to the teeth with devices to connect with businesses- from tweets to texts to telephone calls. But with proper metrics to gauge their performance and lead to instructive training, some of that pressure can be alleviated. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Collaboration and case management: Trends, challenges and expert advice by IBM

November 2011 - (Free Research)
This e-guide takes a look at the use of collaboration and social networking strategies and tools  for case management, including a big picture introduction, expert advice for avoiding headaches, and findings from ebizQ.com's recent survey of business and IT professionals who are using case management in their own companies. 
(EGUIDE) READ ABSTRACT |

The Human Face of Big Data: Pulse of the Planet by ComputerWeekly.com

January 2013 - (Free Research)
Big Data is about to radically transform our understanding of the planet, writes entrepreneur and commentator, Esther Dyson. 
(BOOK) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts