Kiosk TechnologiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Kiosk Technologies returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Network Security
 •   Application Security
 •   Business Intelligence Solutions
 •   Anti-Virus Solutions
 •   Laptops/ Notebooks/ Tablet PCs
 •   Networks
 •   Desktop Management
 •   WAN/ LAN Solutions

Related Searches
 •   Audit Kiosk
 •   Computing Kiosk
 •   Format Kiosk Technologies
 •   Kiosk Conversion
 •   Kiosk Technologies Advertising
 •   Kiosk Technologies Frameworks
 •   Kiosk Technologies History
 •   Kiosk Technologies List
 •   Open Kiosk
 •   Vendors Kiosk Technologies
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Transforming the Business Desktop: PC-over-IP Technology Reinvents Computing by Teradici Corporation

January 2007 - (Free Research)
This white paper gives IT administrators a brief look at the best ways to transform their current desktop environments into an alternative desktop model. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

Increase Productivity and Reduce Security Risks for Teleworkers by SonicWALL

April 2008 - (Free Research)
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Five Common Myths of VDI by Pano Logic, Inc

April 2010 - (Free Research)
VDI promises substantial savings from improved IT productivity, slashed energy and cooling costs, improved hardware reliability, longer endpoint life spans, and much greater flexibility and responsiveness in provisioning and supporting desktop computing. This white paper discusses common myths and realities about VDI. 
(WHITE PAPER) READ ABSTRACT |

CW+: Mobile ticketing market analysis, strategic opportunities and forecasts by ComputerWeekly.com

March 2011 - (Free Research)
This  whitepaper focuses on mobile  ticketing.  Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile  device for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Secure Remote Access by RSA, The Security Division of EMC

September 2007 - (Free Research)
This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ... 
(BROCHURE) READ ABSTRACT |

DigitalPersona Pro by DigitalPersona

January 2006 - (Free Research)
This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on. 
(DEMO) READ ABSTRACT |

The future of Government operations: Digital citizen survey by ComputerWeekly.com

May 2012 - (Free Research)
This report from Accenture looks at the challenges facing the public sector in offering digital services. 
(IT BRIEFING) READ ABSTRACT |

Critical Success Factors Deploying Pervasive BI by MicroStrategy Incorporated

June 2008 - (Free Research)
Pervasive BI is the ability to deliver integrated right-time DW information to all users - it also provides an enterprise with the necessary visibility, insight, and facts to make smarter decisions in all processes at all times. 
(WHITE PAPER) READ ABSTRACT |

Air Transport Industry Insights 2014 by ComputerWeekly.com

May 2014 - (Free Research)
This report from SITA looks at the impact of business intelligence on airlines and airports. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Malware Report: Radisson Hotels Exposed by Guest Data Breach by ESET

September 2009 - (Free Research)
Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened. 
(PODCAST) READ ABSTRACT |

April Business Information E-Zine - Cutting-edge App That In-Memory Technology Makes Possible by SearchBusinessAnalytics

April 2013 - (Free Research)
Consult this resource to find out more about how recent advances have opened in-memory technology to more businesses. It outlines how the excess of business information creates obstacles for many enterprises. Uncover how your business can take control of your data instead of vice versa by reading this resource now. 
(EZINE) READ ABSTRACT |

Key E-Discovery Issues to Consider in 2011 by Dell, Inc.

May 2011 - (Free Research)
This white paper focuses on the key practices and technologies that organizations should pursue as they seek to improve their e-discovery practices and technologies. It also provides a brief overview on the relevant offerings from Dell. 
(WHITE PAPER) READ ABSTRACT |

IT and Analyst Testimonials: TCO Considerations for PC Refresh and Intel vPro Technology by Intel Corporation

May 2009 - (Free Research)
In this video IT professionals from the Symantec ManageFusion Conference discuss how PC refresh and Intel vPro technology helps minimize total cost of ownership. 
(VIDEO)

Gartner Magic Quadrant for WAN Optimization 2013 by Riverbed Technology, Inc.

April 2013 - (Free Research)
Riverbed is positioned in the Leaders Quadrant of the 2013 Gartner Magic Quadrant for WAN Optimization Controllers. In this report, Gartner evaluates vendors based on their ability to execute and completeness of vision. 
(ANALYST REPORT) READ ABSTRACT |

Riverbed® Steelhead® Product Family by Riverbed Technology, Inc.

January 2009 - (Free Research)
Riverbed Steelhead products accelerate application performance and data transfer over the wide area network (WAN), overcoming bandwidth and geographical limitations to improve productivity and enable global collaboration. 
(DATA SHEET) READ ABSTRACT |

The Proven Big Data In-memory Analytical Platform by Kognitio

June 2013 - (Free Research)
In this resource, discover an in-memory analytical platform that's purpose-built for complex analytics. Learn how this relational database can help you handle the growing volume, velocity, and variety of data in your enterprise efficiently and effectively. 
(WHITE PAPER) READ ABSTRACT |

Meeting the Market's needs with your Managed Services by N-able Technologies

May 2013 - (Free Research)
This case study shows how one office technology company implemented an automated remote monitoring and management (RMM) solution to increase profits and customer value, and discusses benefits as well as pitfalls to avoid. 
(WHITE PAPER) READ ABSTRACT |

Turn Big Data Inward With IT Analytics by Riverbed Technology, Inc.

December 2012 - (Free Research)
Big data promises to manage your complex business to make better decisions. But the technology services that run your business are also complex. This Forrester report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register now to get the full report. 
(WHITE PAPER) READ ABSTRACT |

Realise Benefits from a Digital Strategy by ComputerWeekly.com

May 2014 - (Free Research)
Rob Lambert, visiting fellow at Cranfield School of Management, offers advice to CIOs on developing business cases and maximising the business value of digital technology projects. 
(PRESENTATION) READ ABSTRACT |

Harvey Nash CIO Survey 2014 by ComputerWeekly.com

May 2014 - (Free Research)
Business are increasing their investment in technology more quickly than any time since 2006 as confidence returns in the economy, this global survey of IT leaders reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

Technology advances, trends prompt ECM systems maturation by TechTarget

February 2014 - (Free Research)
Technology trends like mobile devices, cloud computing and remote workforces have brought new demands to the arena of enterprise content management. Therefore, achieving a completely unified ECM is a difficult task. However, take this short survey and learn expert tips and tricks and to be on your way! 
(RESOURCE)

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts