Device TechniquesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Techniques returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Data Security
 •   Endpoint Security
 •   Virtualization
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Network Security
 •   Wireless Security
 •   Security Policies

Related Searches
 •   Check Device Techniques
 •   Device Managing
 •   Device Regional
 •   Device Techniques Performance
 •   Device User
 •   Evaluation Device
 •   Implementations Of Device
 •   Intranet Device
 •   Parts Device
 •   Screen Device Techniques
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 22, 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 09, 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

System Memory Power & Thermal Management in Platforms Built on Intel® Centrino® Duo Mobile Tech by Intel Corporation

May 2006 - (Free Research)
This paper discusses the need for memory throttling and addresses two memory throttling techniques, implemented in platforms built on Intel® Centrino® Duo mobile technology. 
(PRODUCT OVERVIEW)

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

E-Guide: Maximizing your Storage Capacity: Data Reduction Techniques and Performance Metrics by IBM

March 2011 - (Free Research)
This e-guide will explore the challenges of data reduction, three data reduction techniques and how to choose the best technique for your data storage environment. Continue reading this e-guide to learn how to maximize your storage capacity. 
(EGUIDE) READ ABSTRACT |

Credit Issuers: Stop Application Fraud At The Source With Device Reputation by iovation, Inc.

June 2009 - (Free Research)
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process. 
(WHITE PAPER) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mobilizing Your Apps and Data Confidently in a BYOD World by Symantec Corporation

June 2012 - (Free Research)
Access this presentation transcript to learn about cutting edge technology and techniques that can not only confidently enable a BYOD strategy, but also help you find productivity and competitive advantages previously unavailable, even in highly regulated and secure industries. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Improve BYOD with the Bonjour Protocol by Aerohive Networks

November 2012 - (Free Research)
This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy. 
(EGUIDE) READ ABSTRACT |

Solid State Storage - A New Standard for Enterprise-Class Reliability by Fusion-IO

February 2009 - (Free Research)
With throughput and seek times faster than disk arrays, data centers are including NAND flash as part of their server infrastructure. Fusion-io offers solid state storage solutions with NAND flash that provides integrity for data exceeding today's solid state storage solutions and surpasses enterprise-class rotating magnetic storage devices. 
(WHITE PAPER) READ ABSTRACT |

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange by SearchSecurity.com

July 2012 - (Free Research)
This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more. 
(EZINE) READ ABSTRACT |

E-Guide: Benchmarking Core Switches: Modeling Techniques for Switch Testing by NETGEAR Inc.

March 2011 - (Free Research)
Bottlenecks can lurk inside a high-speed 10 GbE core switch and cause its actual performance to clock in below theoretical maximum. The solution is benchmark any of these high-end devices before purchase. This e-guide discusses why using model traffic modeling to benchmark core switches is your best choice and how it can cut major costs. 
(EGUIDE) READ ABSTRACT |

Smart enterprise mobility solutions are powered by Smart Containerization™ by CA Technologies.

June 2014 - (Free Research)
This informative white paper examines a technique called containerization, which allows you to keep enterprise data segregated in its own "container" so that you can apply security policies without affecting any data that isn't work related. 
(WHITE PAPER) READ ABSTRACT |

Endpoint Management - IT handbook by SearchDataCenter.com

September 2012 - (Free Research)
Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider. 
(EBOOK) READ ABSTRACT |

Are you ready to handle the challenges of modern backup? by SearchDataBackup.com

March 2014 - (Free Research)
This white paper explains some of the toughest backup challenges facing IT professionals today including data growth and virtual servers. It goes over the ins and outs of backing up large volumes of data and talks about the importance backing up data for mobile devices due to the rise of popularity in BYOD. 
(EBOOK) READ ABSTRACT |

E-Guide: Maximize VMware Storage Efficiency by Dell, Inc. and Intel®

March 2012 - (Free Research)
In this expert e-guide, discover strategies for optimizing storage for your VMware environment by leveraging VMware capabilities and other techniques such as thin provisioning, data deduplication, compression and more. Plus, explore storage options for virtual machines such as raw device mappings and VMFS. 
(EGUIDE) READ ABSTRACT |

5 Things You Must Do Before Letting Your Employees Work From Anywhere by Dell, Inc. and Intel®

June 2012 - (Free Research)
This webcast explores how businesses can leverage the latest technologies to transform their workplaces and create collaborative, mobile and productive environments. Learn about the benefits of implementing a connected workplace strategy. 
(WEBCAST) READ ABSTRACT |

Enabling the Journey to-IT-as-a-Service by Citrix

September 2013 - (Free Research)
This brief webcast looks at how mobile devices have changed the way people work, and how employees now expect IT-as-a-Service, with self-service end-user delivery. 
(WEBCAST) READ ABSTRACT |

Conquer App Management Challenges: On-Demand Application Delivery with XenApp by Citrix

December 2010 - (Free Research)
There are many challenges associated with traditional application management. This whitepaper reviews the benefits of on-demand application delivery and how on-demand app delivery by Citrix XenApp solves those challenges. 
(WHITE PAPER) READ ABSTRACT |

A Practical Guide to WiMAX Antennas: MIMO and Beamforming Technical Overview by Motorola, Inc.

June 2007 - (Free Research)
This white paper details how WiMAX compares to conventional wireless network design and the user benefits of multi-antenna implementations. 
(WHITE PAPER) READ ABSTRACT |

Security Threat Report: July 2009 Update by Sophos, Inc.

July 2009 - (Free Research)
Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers. 
(WHITE PAPER) READ ABSTRACT |

Log Management E-book by RSA, The Security Division of EMC

June 2009 - (Free Research)
Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more. 
(EBOOK) READ ABSTRACT |

More advanced business-class management, security, and reliability than Lenovo. Do more with Dell Latitude. by Dell, Inc.

March 2014 - (Free Research)
This whitepaper offers a checklist for laptops that compares two leading offerings with regards to manageability, durability, and “securability.” 
(WHITE PAPER) READ ABSTRACT |

FIVE THINGS YOUR IT TEAM NEEDS TO KNOW ABOUT MONITORING MOBILE APPLICATIONS by Hewlett-Packard Company

October 2011 - (Free Research)
Mobile applications are radically altering the way businesses operate and how they interact with their employees and customers. Read this paper to learn performance management techniques that will allow you to confidently provide the same high level of service for mobile applications that your legacy applications now deliver. 
(WHITE PAPER) READ ABSTRACT |

Benchmarking Enterprise SSDs by sTec | HGST

February 2010 - (Free Research)
This paper will demonstrate differ­ences in comparative SSD products. The analysis reconciles instanta­neous benchmark data to actual user performance, over time in a work­ing system under a true enterprise workload. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts