portable

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
     Absolute Software
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
     Absolute Software
By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr, asset security strategy, patients, employees, best practices, reportable incidents
     Absolute Software
By: Adlib Software     Published Date: Aug 21, 2007
Read this whitepaper to learn about PDF/A and how it must be implemented in conjunction with tools and applications to manage records according to the various business practices and recordkeeping processes today's information-dependant organizations employ.
Tags : data management, adlib, adlib software, document management, pdf, portable document format, adobe acrobat, pdfs, records management
     Adlib Software
By: AppDynamics     Published Date: Sep 20, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : secure, performance, portable, architecture, software, hardware, java
     AppDynamics
By: CA Technologies EMEA     Published Date: May 29, 2018
From startups to established companies, containers help meet the demands of a modern digital business –supporting massively scalable, portable and fast to deploy apps. Engineered for the Modern Applications, Built by Modern Teams. Yes, it’s complex. And yes, there is much to consider. Start here for a quick overview of the essentials of container monitoring.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 29, 2018
In time, containers will be the means by which all workloads are deployed on server platforms. It makes too much sense. Constructing fake machines around virtual workloads, just to make them portable across servers, was not the architecturally rational thing to do. It was the expedient thing to do, because cloud platforms had not yet evolved to where they needed to be. This book presents a snapshot of the emerging approaches to container monitoring and distributed systems management that engineers and their customers are building together.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
     CA Technologies EMEA
By: Catalyst SF     Published Date: Feb 29, 2008
This white paper has been written for executives at media publishing and content companies interested in learning about the exploding “non-streamed” or portable video market and finding out about best practices for driving revenue through advertising in this medium.
Tags : downloadable video, downloadable media, video, catalyst, catalyst sf
     Catalyst SF
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
     Data Guard Systems, Inc
By: Dell & Microsoft     Published Date: Mar 06, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
     Dell & Microsoft
By: Dell & Microsoft     Published Date: Mar 13, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
     Dell & Microsoft
By: Dell EMC EMEA     Published Date: Nov 23, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
     Dell EMC EMEA
By: Dell PC Lifecycle     Published Date: May 22, 2018
Les modèles d'achat de PC en entreprise évoluent, tandis que les acheteurs souhaitent améliorer à la fois la sécurité et l'expérience des employés. La mobilité des employés augmente dans le monde entier et les investissements d'entreprise basculent vers les tablettes et les ordinateurs portables. Les entreprises étudient ainsi leurs investissements actuels dans les PC traditionnels. Un élément reste clair : les acheteurs de PC en entreprise accordent toujours de l'importance à la sécurité et aux performances qu'offrent les PC fixes. Ils indiquent également que les nouveaux formats, comme les micro PC, les aident à apporter une meilleure expérience aux employés, critère auquel ils accordent au moins autant d'importance qu'à la sécurité. En savoir plus sur les solutions Dell en collaboration avec Intel®.
Tags : 
     Dell PC Lifecycle
By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
     ElcomSoft
By: ForgeRock     Published Date: Mar 10, 2015
L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.
Tags : software development
     ForgeRock
By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
     GFI
By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
     GFI
By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : mobile application, mobile convenience, business opportunities, travel
     HP - Enterprise
By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
     IBM
By: iDirect     Published Date: Jan 29, 2007
With careful monitoring of competitors’ sites and reporting of any violations of search engine terms of service found, search engine results can in fact be directly affected. Learn how to identify your online competitors as well as common issues that can lead to reportable SEO violations.
Tags : search marketing, search engine optimization, seo, competitive analysis, seo firms, seo firm, competitors, competitor marketing
     iDirect
By: Iomega InfoCenter     Published Date: May 17, 2012
In this eBook you will learn about the efficient, economical ways to address the small business storage issues outlined above without busting the small business budget or hiring an IT department.
Tags : external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, it management, data management
     Iomega InfoCenter
By: Iomega InfoCenter     Published Date: May 17, 2012
So, how do you know which solution is best suited for your business needs and IT requirements? Read this Buyer's Guide for five easy steps to help you determine which Iomega video surveillance solution is right for you.
Tags : surveillance, video surveillance, surveillance solutions, external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, digital, cameras, it management
     Iomega InfoCenter
By: Iomega InfoCenter     Published Date: May 17, 2012
Once again, EMC and Iomega have developed a solution to alleviate concerns and ensure smooth transitions to the cloud with a variety of flexible, innovative solutions. Find out more!
Tags : external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, storcenter, backup and recovery, security, data management
     Iomega InfoCenter
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com