Portable Electronic PublicWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Portable Electronic Public returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Email Archiving
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Laptops/ Notebooks/ Tablet PCs
 •   Storage Security
 •   Security Policies
 •   Enterprise Systems Management

Related Searches
 •   Call Portable Electronic Public
 •   Cycle Portable
 •   Desktops Portable Electronic
 •   Portable Electronic Market
 •   Portable Electronic Public Case Study
 •   Portable Electronic Public New Hampshire
 •   Portable Electronic Public Site
 •   Portable Electronic Public Testing
 •   Portable Regional
 •   Programs Portable Electronic
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Support Global Expansion with Trade and Financial Compliance by SAP America, Inc.

November 05, 2009 - (Free Research)
The SAP BusinessObjects Electronic Invoicing for Brazil (SAP BusinessObjects Nota Fiscal Eletronica) application helps companies that do business in Brazil meet digital invoice regulations. The application enables automated, certified, and secure communication with government systems at the state and federal level. 
(ANALYST BRIEF) READ ABSTRACT |

Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension

January 06, 2011 - (Free Research)
USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk. 
(WHITE PAPER) READ ABSTRACT |

Tablet & eReaders: strategies and opportunities by ComputerWeekly.com

September 05, 2011 - (Free Research)
In this report extract, Juniper Research discusses trends in the market for tablet PCs and eReaders. 
(ANALYST BRIEF) READ ABSTRACT |

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices by SearchSecurity.com

July 26, 2011 - (Free Research)
This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

CW+: Quocirca report: Effective public sector citizen communication by ComputerWeekly.com

August 12, 2010 - (Free Research)
The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Managed Public Key Infrastructure: Securing Your Business Applications by VeriSign EMEA

December 01, 2005 - (Free Research)
The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation. 
(WHITE PAPER) READ ABSTRACT |

The future of Government operations: Digital citizen survey by ComputerWeekly.com

May 02, 2012 - (Free Research)
This report from Accenture looks at the challenges facing the public sector in offering digital services. 
(IT BRIEFING) READ ABSTRACT |

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information by Iron Mountain

December 31, 2013 - (Free Research)
Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices. 
(WHITE PAPER) READ ABSTRACT |

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The Business Case for Cloud Computing in Today's Health Care Industry by NetApp

June 2012 - (Free Research)
This E-Book from SearchHealthIT.com highlights some of the most important considerations for integrating public and private cloud structures into your health care facility. Within, learn about the cloud's risks and rewards, how to prepare for public cloud services, setting up your own private cloud, and much more. 
(EBOOK) READ ABSTRACT |

Computer Weekly 2 August 2011: We examine the calls for radical reform in the relationship between Whitehall and its IT suppliers by ComputerWeekly.com

August 2011 - (Free Research)
With the release of a scathing report on government IT, we examine calls for radical reform in the relationship between Whitehall and its IT suppliers. Also this week, the first part of our Buyer’s Guide to Big Data, and a case study on how Carphone Warehouse improved customer satisfaction by 38% using business process management (BPM) software. 
(EZINE) READ ABSTRACT |

PC on a Stick: A Portable Endpoint Security Nightmare by Lumension

January 2007 - (Free Research)
Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns. 
(WHITE PAPER) READ ABSTRACT |

How to Achieve Device Control Peace of Mind by Lumension

July 2013 - (Free Research)
Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices. 
(CASE STUDY) READ ABSTRACT |

Dell Cuts IT Work, Tightens Security, Improves Performance with New Software by Dell, Inc. and Intel®

November 2009 - (Free Research)
Dell is planning to upgrade its 100,000 desktop and portable computers to the Windows® 7 operating system to reduce desktop management costs and enhance data security. Read this case study to learn more about Dell's business needs as well as the features and benefits achieved from Microsoft's solutions. 
(CASE STUDY) READ ABSTRACT |

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine

April 2010 - (Free Research)
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. 
(EZINE)

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Ecomanage Network Corporation Develops a Service Offering for Manufacturers to Fully Manage Wastes and Meet Disposal Regulations by IBM

October 2009 - (Free Research)
Read this case study to see how IBM Global Services implemented and is operating the Wastes and Resources Circulation Management System, a hybrid solution of private and public cloud computing. 
(CASE STUDY) READ ABSTRACT |

Southeastern Orthopedic Center Cools Server Rooms and Keeps Systems Running with Tripp Lite by Tripp Lite

June 2011 - (Free Research)
Access this exclusive case study to discover how one organization in the health industry used a portable air conditioning unit to cool small server rooms to protect network devices without risking electrical damage due to water. 
(CASE STUDY) READ ABSTRACT |

Increasing Productivity with Mobile Business PCs by Dell, Inc. and Intel®

March 2011 - (Free Research)
After investigating various options, Intel IT selected mobile PCs as the standard computing platform. Mobile business PCs, by nature, are highly portable and their robust feature set provides productivity advantage to employees, while meeting a majority of the company's diverse requirements. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

2006 Global Information Security Workforce Study by ISC2

October 2006 - (Free Research)
Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required. 
(WHITE PAPER) READ ABSTRACT |

Media Mobility Delivering Ultimate Video Experiences by Motorola, Inc.

December 2008 - (Free Research)
Media Mobility promises a sophisticated user experience that will enable operators to dramatically increase their multi-play service bundles that integrate voice, data and video offerings. 
(WHITE PAPER) READ ABSTRACT |

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks by IronKey

March 2009 - (Free Research)
Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level. 
(WHITE PAPER) READ ABSTRACT |

Prince George’s County School District Streamlines Email Investigations and Boosts IT Productivity with Google Apps and Google Message Discovery by Google Postini

December 2009 - (Free Research)
In March 2008, Prince George's County Public Schools ran a pilot of Google Apps Education Edition. In this case study, you'll learn how they used it to dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts