Kiosk TechnologiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Kiosk Technologies returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Anti-Virus Solutions
 •   Networks
 •   Desktop Management
 •   WAN/ LAN Solutions
 •   Network Security
 •   Fraud Detection & Prevention
 •   Endpoint Security
 •   Industrial Mobile Computing/ Rugged Handhelds

Related Searches
 •   Companies Kiosk Technologies
 •   Experts Kiosk Technologies
 •   Export Kiosk
 •   Kiosk Planner
 •   Kiosk Technologies Coding
 •   Kiosk Technologies Schemas
 •   Kiosk Technologies Scripts
 •   Kiosk Technologies Specialist
 •   Schemas Kiosk Technologies
 •   Workflow Kiosk Technologies
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 29, 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Transforming the Business Desktop: PC-over-IP Technology Reinvents Computing by Teradici Corporation

January 2007 - (Free Research)
This white paper gives IT administrators a brief look at the best ways to transform their current desktop environments into an alternative desktop model. 
(WHITE PAPER) READ ABSTRACT |

Increase Productivity and Reduce Security Risks for Teleworkers by SonicWALL

April 2008 - (Free Research)
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits. 
(WHITE PAPER) READ ABSTRACT |

Mobile ticketing opens doors of opportunity for business by ComputerWeekly.com

November 2010 - (Free Research)
Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile phone for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Cisco Catalyst 3560 Series Switches by Cisco Systems, Inc.

The Cisco® Catalyst® 3560 Series is a line of fixed-configuration, enterprise-class switches that include IEEE 802.3af and Cisco prestandard Power over Ethernet (PoE) functionality in Fast Ethernet and Gigabit Ethernet configuration. 
(HARDWARE PRODUCT)

Five Common Myths of VDI by Pano Logic, Inc

April 2010 - (Free Research)
VDI promises substantial savings from improved IT productivity, slashed energy and cooling costs, improved hardware reliability, longer endpoint life spans, and much greater flexibility and responsiveness in provisioning and supporting desktop computing. This white paper discusses common myths and realities about VDI. 
(WHITE PAPER) READ ABSTRACT |

CW+: Mobile ticketing market analysis, strategic opportunities and forecasts by ComputerWeekly.com

March 2011 - (Free Research)
This  whitepaper focuses on mobile  ticketing.  Juniper Research defines a mobile ticketing user as “someone who stores a ticket on their mobile  device for later redemption” at the point of travel, the music venue, the cinema etc. 
(WHITE PAPER) READ ABSTRACT |

Secure Remote Access by RSA, The Security Division of EMC

September 2007 - (Free Research)
This product brochure discusses how RSA's Secure Remote Access solution allows organizations to strongly authenticate and positively establish users' identities before granting access to the resources they need to work, regardless of their ... 
(BROCHURE) READ ABSTRACT |

DigitalPersona Pro by DigitalPersona

January 2006 - (Free Research)
This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on. 
(DEMO) READ ABSTRACT |

The future of Government operations: Digital citizen survey by ComputerWeekly.com

May 2012 - (Free Research)
This report from Accenture looks at the challenges facing the public sector in offering digital services. 
(IT BRIEFING) READ ABSTRACT |

Critical Success Factors Deploying Pervasive BI by MicroStrategy Incorporated

June 2008 - (Free Research)
Pervasive BI is the ability to deliver integrated right-time DW information to all users - it also provides an enterprise with the necessary visibility, insight, and facts to make smarter decisions in all processes at all times. 
(WHITE PAPER) READ ABSTRACT |

The Malware Report: Radisson Hotels Exposed by Guest Data Breach by ESET

September 2009 - (Free Research)
Matt Grant talks with Randy Abrams about a data breach at Radison Hotels. Unfortunately, an unknown number of their guests' credit card numbers were exposed to malicious hackers. In this podcast, Randy dishes out some advice on how to prevent this sort of data breach and what to do in the event that it’s already happened. 
(PODCAST) READ ABSTRACT |

How Technology Is Transforming Finance by Oracle Corporation UK Ltd

April 2014 - (Free Research)
This resource collects articles from CIO and The Economist Intelligence Unit regarding how technology is transforming finance and the growing partnership between finance and IT. 
(WHITE PAPER) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

IT Transformation Consulting Services: Align Your Technology Direction by Hewlett-Packard Company

December 2012 - (Free Research)
This brief white paper demonstrates how your organization can make the right choices to transform your IT so that it's fully aligned with business goals by employing consulting services that create an integrated, strategic IT roadmap. 
(WHITE PAPER) READ ABSTRACT |

Pervasive Technology Trends Shaping the Business and the Implications for Your Data Center by IBM

July 2013 - (Free Research)
Explore this exclusive, in-depth white paper to uncover the data center implications of four leading technologies, as well as tools and techniques that IBM has designed to help companies build data center strategies to hold up against such disruptive technologies. 
(WHITE PAPER) READ ABSTRACT |

CMO Guide: How to Evaluate Marketing Technology by IBM

April 2014 - (Free Research)
The right people, strategy, and processes are critical for a top-notch customer-driven marketing strategy -- but so is the right technology. If you're considering new tools to increase your marketing prowess, turn to this guide to implementing technology that will help improve your marketing outcomes. 
(WHITE PAPER) READ ABSTRACT |

Greater Strategic Effectiveness through Perpetual Planning by CA Technologies.

August 2013 - (Free Research)
The rapid adoption of new technologies and changing customer demands make it increasingly difficult for companies to act on strategic opportunities. Learn about the benefits of shifting to a more agile perpetual planning approach, you can work toward your five year plan while incorporating strategic planning into daily activities. 
(WHITE PAPER) READ ABSTRACT |

The 2014 Endpoint Security Buyers Guide by Lumension

August 2013 - (Free Research)
This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology. 
(WHITE PAPER) READ ABSTRACT |

How Human Capital and Talent Technology are Influencing Global Business by Oracle Corporation

March 2012 - (Free Research)
During the spring of 2011, Deloitte joined forces with Oracle to survey 126 corporate and HR leaders, representing a broad range of industries around the world. In this report, they take a closer look at how businesses are using human capital management (HCM) technology to meet their growth goals. 
(WHITE PAPER) READ ABSTRACT |

Socially Driven Collaborations by Oracle Corporation UK Ltd

April 2014 - (Free Research)
Access the following white paper to explore the changing relationship in IT and marketing through the adoption of social technologies. Uncover the various challenges when stating up with this collaboration technology, how to avoid them, and more. 
(WHITE PAPER) READ ABSTRACT |

Forrester - A Custom Technology Profile: Leverage Cloud-Based Contact Center Technologies to Deliver Great Customer Experiences by Genesys

March 2013 - (Free Research)
In this white paper, explore the results of a survey from Forrester Research, Inc. to see how companies are dealing with contact center challenges and new technologies. 
(WHITE PAPER) READ ABSTRACT |

Empowering Modern Finance by Oracle Corporation

April 2014 - (Free Research)
Modern financial organizations are no longer satisfied with simply containing costs -- they are committed to improving operations, leveraging analytics, and producing data-driven insight. In this report, discover what C-suite and line-of-business execs had to say about the goals of modern finance organizations and the role of technology. 
(WHITE PAPER) READ ABSTRACT |

The Role of Data Integration and Quality Management in NIEM by Information Builders

May 2013 - (Free Research)
Check out this paper today to investigate how the National Information Exchange Model (NIEM) has grown. Learn about the challenges it was designed to overcome and of the important role that enterprise integration and data quality management technologies play in the execution of NIEM initiatives. 
(WHITE PAPER) READ ABSTRACT |

Monitoring and Management for the Next-Generation Network by SearchNetworking.com

August 2013 - (Free Research)
With all the changing network technologies and architectures – due to innovations like SDN and gigabit wireless, it's hard for IT managers to know when to invest. This issue of The Network Evolution explores these challenges with an in-depth look at network monitoring and management for the next-generation network. 
(EZINE) READ ABSTRACT |

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts