abs

Results 226 - 250 of 504Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
     Absolute Software
By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : absolute, computrace, secure, tracking, security, manage, protect
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Join Michael Scarpelli, Technical Support Manager for La Jolla Institute for Allergy & Immunology, as he shares how his team streamlines and automates computer setup and maintenance for a rapidly growing network of more than 500 machines.
Tags : absolute, technical support, healthcare organizations, operating environment
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
This white paper provides guidelines to help you create policies for computer energy consumption that are sensible and easy to enforce.
Tags : absolute, power saving policy, management, roi, energy savings, policy metrics, network management
     Absolute Software
By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
     Absolute Software
By: Motorola     Published Date: May 05, 2010
Digital radio seemed to be the best route for NASCAR to achieve the key requirements surfaced in this study, which included their need to coordinate large numbers of radios, ensure absolute audio clarity, maintain consistent, reliable communications and have a radio that was durable enough to withstand a rough environment.
Tags : motorola mototrbo, communication system, digital radio, two-way radio, voice clarity, audio
     Motorola
By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: NetApp Exchange Upgrade     Published Date: Dec 17, 2008
Regardless of industry or geographic location, business information is exploding on a massive scale—affecting primary, secondary, and archival storage systems. The sheer quantity of data being amassed is outpacing organizations' ability to keep tabs on it, maintain corporate compliance, meet strict government regulation, and even simply house it in a useful format that can provide invaluable history and knowledge. Learn more today.
Tags : netapp, microsoft exchange server 2007, netapp networked storage, storage systems, storage infrastructure, microsoft exchange deployments, server virtualization, scalability limitations, enterprise applications, platforms, storage, data management
     NetApp Exchange Upgrade
By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
     VMware
By: Cornerstone OnDemand     Published Date: Dec 10, 2014
What do we mean by agility? It’s how powerfully your organization can react to changes in the marketplace, recognize and close employee skill gaps, and align the right people in the right places to handle any pivots in business strategy. How can you make your organization more agile? There are several critical things you must do. Learn about it all in this whitepaper.
Tags : cornerstone ondemand, agility, organizations, business agility, business strategy, employee skills, productivity
     Cornerstone OnDemand
By: Kronos Incorporated     Published Date: Jul 27, 2011
The true cost of employee absenteeism is staggering. Average cost of employee absence: 35% of payroll. Being average isn't always a good thing. Get more surprising workforce facts Mercer uncovered in this exclusive study of nearly 300 organizations.
Tags : kronos, employee absenteeism, mercer absence research, financial impact, lost productivity, employee absence
     Kronos Incorporated
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value Map™ (SVM). The SVM illustrates the relative value of security investment options by mapping security effectiveness and value (TCO per protected - connections per second (CPS)) of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests. Individual PARs are available for every product tested. CARs provide detailed comparisons across all tested products in the areas of: ? Security ? Performance ? Total cost of ownership (TCO)
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
     Citrix Systems
By: Quorum Labs     Published Date: Nov 10, 2011
Download this paper to learn about virtual recovery solutions that SMBs need to bring an application back online in a matter of minutes.
Tags : backup, recovery, recover, best practices, quorum, smb, small and medium business, application, virtualization, on-site appliances, customers, online backup, disaster recovery, high availability, disaster recovery solutions, it recovery plan, online recovery solution
     Quorum Labs
By: Oracle Global Marketing     Published Date: Jul 13, 2012
Answer a few questions about your database management practices, and get a better understanding of your organization's ability to ensure highly available database services.
Tags : database, database assesment tool, database services, customer confidence, database availability, database management, database management practices, orcale database appliance, intel xeon processors, database deployment, databse maintenance, enterprise applications, data management
     Oracle Global Marketing
By: Joyent     Published Date: Jul 16, 2012
Does Your Cloud Support A Mobile-First Strategy? A Joyent White Paper - Abstract
Tags : cloud support, joyent, mobile, strategy, cloud computing
     Joyent
By: McAfee     Published Date: Jan 23, 2013
Some IT and Security teams wonder if automated vulnerability management is important given the many pressing demands. The purpose of this paper is to help these IT and Security professionals evaluate their security posture and risk.
Tags : mcafee vulnerability manager, vulnerability management, mcafee labs, mcafee epolicy orchestrator, mcafee epo, mcafee epolicy orchestrator, patch tuesdays, mcafee policy auditor, mcafee risk & compliance, security, it management, data management, data center
     McAfee
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com