Computing Podcast PosWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Podcast Pos returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Business Intelligence Solutions
 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Grid/ Utility Computing
 •   Network Management
 •   Shopping Carts/ Point of Sale (POS)
 •   Data Center Management
 •   Grocery And Drug Stores
 •   Enterprise Retailing

Related Searches
 •   Buys Computing
 •   Computing Measures
 •   Computing Operations
 •   Computing Podcast Pos Control
 •   Computing Podcast Pos Conversions
 •   Computing Podcast Secure
 •   Conversions Computing Podcast Pos
 •   Files Computing
 •   Problem Computing
 •   Procedures Computing Podcast
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Key Takeaways from InterConnect 2012 by IBM

March 15, 2013 - (Free Research)
Listen to the latest episode in the Smarter Computing podcast series and hear industry leaders talk about how companies from all industries and markets are using the key pillars of data, cloud and security to transform their infrastructure and make IT architecture leaner, more cost-efficient and increasingly agile. 
(PODCAST) READ ABSTRACT |

Lowering the Point of Sale System Support Costs with Intel® vPro™ Technology by Wipro Technologies

February 06, 2009 - (Free Research)
Written for retail IT organizations managing Point of Sale (POS) systems, this paper shows hard dollar savings that retailers can expect to see by adopting advanced POS systems with Intel® vPro™ technology. 
(ARTICLE) READ ABSTRACT |

Attacks on Point of Sale Systems by Symantec Corporation

March 11, 2014 - (Free Research)
Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS. 
(WHITE PAPER) READ ABSTRACT |

Paramount Foods Upgrades Store Technology by Hewlett-Packard Company

March 2008 - (Free Research)
Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers. 
(WHITE PAPER) READ ABSTRACT |

PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security by GFI Software

August 2008 - (Free Research)
With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs... 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

HP POS System Helps Mayors Improve Customer Service, Gain Selling Time by Hewlett-Packard Company

August 2008 - (Free Research)
Among the priorities for the new system were ease of use by salespeople, an easy-to-manage centralized customer database for lookup and validation, and the use of broadband connectivity. Maintaining access to proprietary applications that supported nonsales functions was also required. 
(CASE STUDY) READ ABSTRACT |

Fair exchange protocols with anonymity and non-repudiation for payments by ComputerWeekly.com

May 2013 - (Free Research)
This article in our Royal Holloway Information Security series looks in detail at two key principles necessary for secure payments: fair exchange and non-repudiation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Anatomy of an Attack by Promisec

May 2014 - (Free Research)
This document breaks down the malware attack that was launched on Target. It also illustrates how Promisec can deliver true visibility and control in a constantly evolving threat environment. 
(WHITE PAPER) READ ABSTRACT |

Mobile Optimization – It’s Now or Never by AT&T Corp

September 2011 - (Free Research)
Read this article to discover best practices for creating a a consumer-friendly, mobile shopping experience. 
(WHITE PAPER)

The Power of Mobile Peripherals by BlackBerry

February 2010 - (Free Research)
This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits. 
(WHITE PAPER) READ ABSTRACT |

The NFC Retail Opportunity by ComputerWeekly.com

May 2012 - (Free Research)
This exclusive report for Computer Weekly readers by Juniper Research, offers a comprehensive briefing for senior IT professionals on the opportunities for NFC mobile payment technology, markets and trends. 
(ANALYST REPORT) READ ABSTRACT |

Driving Your Channel Business: Leverage Information Technology to Improve Partner Relationships and Boost Channel Performance by SAP AG

September 2008 - (Free Research)
This white paper discusses key channel business trends, highlights the complexities and challenges of different channel models. 
(WHITE PAPER) READ ABSTRACT |

SOA and BPM: A Process Centric Approach - Part 1 Background and Basic by Oracle Corporation

June 2009 - (Free Research)
In a process centric approach to SOA and BPM, perspectives of strategy, systems, business and technology can be incorporated in order to achieve successful change in business processes - discussed here as Service-Oriented Computing (SOC) as a way of gaining a better view on SOA in relation to BPM. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Vblock Specialized System for High Performance Databases by VCE (E-mail this company)

December 2013 - (Free Research)
In this resource, discover a converged infrastructure specifically designed for demanding, high-performance databases that provides millisecond response times, continuous availability, and high flexibility. 
(ARTICLE) READ ABSTRACT |

Podcast: Intel IT: Best Practices for Operating and Managing our Private Cloud by Intel

October 2011 - (Free Research)
Listen to this podcast to learn about one cloud platform that enhances traditional benefits and learn how your enterprise can take advantage of immediate provisioning, higher responsiveness, lower business costs and much more. 
(PODCAST) READ ABSTRACT |

Detecting Zero-Day Exploits in the Wild by Websense

March 2014 - (Free Research)
This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Virtualization is here: Is your network ready? by Citrix

July 2010 - (Free Research)
In this podcast, learn about the emerging technologies driving the transition to App Delivery 2.0. Uncover how network virtualization can be applied to better optimize application delivery, provide increased flexibility and create an efficient network infrastructure with a mix of hardware and software solutions. 
(PODCAST) READ ABSTRACT |

Post-Migration Best Practices: Exchange Environment Operation by Dell Software

April 2011 - (Free Research)
In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know. 
(WHITE PAPER) READ ABSTRACT |

8 Ways On-site Service Can Drive Revenue Now by OnForce, Inc.

January 2008 - (Free Research)
Innovative service delivery models are creating new revenue opportunity for solution providers. This paper explores tangible ways solution providers can leverage on-site service to expand their businesses, enter new markets, and better serv... 
(ANALYST REPORT) READ ABSTRACT |

PODCAST: Creating a Competitive Edge: Extending the SharePoint Platform to meet Enterprise 2.0 by Vorsite Corporation

October 2008 - (Free Research)
Listen to this podcast to learn how Vorsite has worked with the world's largest software company to implement an Enterprise 2.0 solution that provided a comprehensive business productivity platform. 
(PODCAST) READ ABSTRACT |

Social Business Podcast Series by IBM

November 2011 - (Free Research)
A Social Business enables its employees – and customers – to more easily find the information and expertise they seek. Access this podcast series for an in-depth guide to establishing a Social Business for real-time communication and collaboration. 
(PODCAST)

Cloud Computing 101 by SearchDataCenter.com

October 2009 - (Free Research)
Tune into this podcast for expert insight into the impact of cloud computing on your IT infrastructure. Hear from cloud computing expert, Jeff Kaplan, as he explains the basic pressures driving cloud computing. Learn about Amazon's influence on the cloud market and discover the 3 elements that attract enterprises to the cloud. 
(PODCAST) READ ABSTRACT |

Podcast: Cloud Client Computing - Enabling Modern Work Styles with Desktop Virtualization by Dell and Microsoft

May 2014 - (Free Research)
In this webcast, industry insiders discuss how Windows and Dell have teamed up in order to deliver a great value with key VDI platform capabilities. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Maintaining Disaster Recovery Objectives in the Cloud by i365, makers of Evault

November 2009 - (Free Research)
In this presentation transcript, learn how to ensure your disaster recover (DR) needs are met by your cloud provider. Gain insight into the differences between standard and cloud-based DR approaches and how to incorporate your exiting DR plans. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts