Cases DeviceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Cases Device returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Unified Communications / Voice & Data Convergence
 •   Mobile Field Sales/ Wireless Connectivity
 •   Wireless Security
 •   Virtualization
 •   Application Management and Maintenance

Related Searches
 •   Cases Desktops
 •   Cases Device Forms
 •   Cases Formats
 •   Definition Cases
 •   General Cases
 •   Licenses Cases Device
 •   Methodology Cases
 •   Portal Cases
 •   Trend Cases
Advertisement

ALL RESULTS
1 - 25 of 426 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both. by Insight

May 13, 2013 - (Free Research)
Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more. 
(WHITE PAPER) READ ABSTRACT |

IT Security Case Studies by ComputerWeekly.com

June 21, 2013 - (Free Research)
Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Understanding the Benefits of Application Virtualization by Dell and Microsoft

June 28, 2012 - (Free Research)
Explore how application virtualization can help your business prepare for the consumerization of IT. Access this expert resource to gain insights on its many use cases, how it differs from desktop virtualization, and the substantial benefits it can offer both your IT department and end-users. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption by BlackBerry

November 2007 - (Free Research)
This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements. 
(WHITE PAPER) READ ABSTRACT |

eGuide: Collaboration and case management: Trends, challenges and expert advice by IBM

November 2011 - (Free Research)
This e-guide takes a look at the use of collaboration and social networking strategies and tools  for case management, including a big picture introduction, expert advice for avoiding headaches, and findings from ebizQ.com's recent survey of business and IT professionals who are using case management in their own companies. 
(EGUIDE) READ ABSTRACT |

How Red Robin Gourmet Burgers Nailed Mobile Engagement: A Case Study by Citrix

February 2014 - (Free Research)
This crucial case study examines a restaurant that utilizes mobile devices to enhance and streamline customer engagement to boost productivity and user satisfaction. Read on to learn how your organization can achieve similar results. 
(CASE STUDY) READ ABSTRACT |

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud by iovation, Inc.

June 2009 - (Free Research)
Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud. 
(CASE STUDY) READ ABSTRACT |

Case Study: Milton Keynes College by Dell, Inc.

October 2013 - (Free Research)
As bring your own device (BYOD) trends continue to soar, it is important to adapt your IT policies to the landscape. This case study outllines how Milton Keynes College embraced new BYOD policies, leading to a better experience of their students. 
(WHITE PAPER) READ ABSTRACT |

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension

October 2013 - (Free Research)
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry. 
(WHITE PAPER) READ ABSTRACT |

Wireless - Aironet 350 Series by Cisco Systems

The Cisco Aironet 350 Series of wireless LAN (WLAN) products leads the industry in performance, security, and reliability with cost effective solutions for the enterprise and small and medium-sized businesses. The Cisco Aironet 350 Series access point provides an ideal solution for customers who desire a non-upgradable IEEE 802.11b solution. 
(HARDWARE PRODUCT)

Case Study: Secure BYOD With an SDN Application by Hewlett-Packard Limited

April 2014 - (Free Research)
This exclusive case study examines how an educational institution was able to take advantage of an SDN application to leverage existing hardware and allow users to connect their personal devices to the network securely, allowing for a remarkable increase in productivity. 
(CASE STUDY) READ ABSTRACT |

Protection For Every Enterprise, How BlackBerry Security Works by BlackBerry

March 2014 - (Free Research)
This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure. 
(WHITE PAPER) READ ABSTRACT |

Securing mobile device in the business environment by IBM

February 2014 - (Free Research)
This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value. 
(WHITE PAPER) READ ABSTRACT |

UK College Embraces BYOD and Cuts IT Spend by Dell, Inc.

October 2013 - (Free Research)
This white paper features a case study on a UK college that enhanced its virtual infrastructure to ensure high speed and easy management, allowing students and staff to have better access to the network from their personal devices. 
(WHITE PAPER) READ ABSTRACT |

vokeStream Market Snapshot: Automated Testing of Networks and Connected Devices by Fanfare

November 2007 - (Free Research)
Service providers and network equipment manufacturers are adding automation to their pre-production testing process for a combination of reasons. This Market Snapshot will focus on the need for test automation of networks and connected devices, identify a path to automation adoption and provide an overview of the market. 
(ANALYST REPORT) READ ABSTRACT |

Mobile banking strategies - maximise your revenues by ComputerWeekly.com

December 2010 - (Free Research)
Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”. 
(WHITE PAPER) READ ABSTRACT |

Profitable Innovation:  Medical Device Business Model for Growth by Sage North America

December 2010 - (Free Research)
This Sage ERP Accpac white paper focuses on innovations in the medical device field and how these innovative solutions affect the bottom line. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 11 December 2012: Microsoft puts up prices again by ComputerWeekly.com

December 2012 - (Free Research)
In this week's Computer Weekly, we look at Microsoft's latest price increase for key business software products, and hear from experts on why the decision is flawed. We talk to an organisation that swapped 3,000 BlackBerrys for iPads and iPhones. And we examine the importance of service-level agreements when moving to the cloud. Read the issue now. 
(EZINE) READ ABSTRACT |

VMworld Europe Case Study: Tiger Wheel and Tyre by ComputerWeekly.com

November 2012 - (Free Research)
Virtualisation has helped Tiger Wheel and Tyre future proof its infrastructure and gain a competitive edge. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 18 March 2014: Boost productivity with collaboration technology by ComputerWeekly.com

March 2014 - (Free Research)
In this week's Computer Weekly, we hear from IT leaders improving collaboration and productivity for employees by using technologies such as unified communications and social media. We report from Mobile World Congress on the latest trends. And we examine how mobile device management tools can help build a trusted BYOD policy. Read the issue now 
(EZINE) READ ABSTRACT |

Public complaints case study by SAS

March 2013 - (Free Research)
With large volumes of data pouring into the Hong Kong Efficiency Unit's call center, they needed a way to manage this information and provide excellent customer service. Read this brief case study to see how they leveraged a visual analytics platform to take more effective action and make better decisions. 
(CASE STUDY) READ ABSTRACT |

Gartner's Magic Quadrant for Security Information and Event Management 2008 by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 426 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts