Hardware  >   Peripheral Hardware  >   Printers  >  

Handheld Mobile Printers

RSS Feed    Add to Google    Add to My Yahoo!
Handheld Mobile Printers White Papers (View All Report Types)
 
How Mobile Printers Drive Efficiency Throughout the Supply Chain
sponsored by Zebra Technologies
WHITE PAPER: This paper discusses how supplementing enterprise-printing operations with mobile printers eliminates bottlenecks and boosts accuracy, resulting in better overall performance of manufacturing, warehouse management, and supply chain operations.
Posted: 26 Feb 2010 | Published: 26 Feb 2010

Zebra Technologies

Easily Print From Any Mobile Device
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This crucial white paper discusses a printing solution that allows you to easily add wireless direct printing and touch-to-print technology to your printer or MFP, allowing the entire office to print from their mobile devices.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Hewlett-Packard Enterprise

Secure Mobile Printing for Business
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative white paper discusses how your organisation can enable reliable printing from any mobile platform or operating system while still providing IT administrators the control over network access and output to protect confidential information.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Hewlett-Packard Enterprise

Protecting Your Data in the Digital Transformation Journey
sponsored by HPE and Intel® Corporate
WHITE PAPER: Application performance enables competitive advantage by increasing productivity, but could you be wasting time with servers that aren't secure? Discover a number of overarching rules and business attributes to help protect your organization's data.
Posted: 29 Jun 2016 | Published: 29 Feb 2016

HPE and Intel® Corporate

Achieve Rapid Cold Start Success for SAP HANA
sponsored by IBM
WHITE PAPER: Today's business landscape requires speed and constant availability from your database. Even if you run a tight operation, there are going to be times when a restart is unavoidable. Access this white paper to learn about a power system that can execute cold starts, leading you to a number of business benefits.
Posted: 22 Mar 2017 | Published: 30 Sep 2016

IBM

Reduce data center complexity when you 'go virtual'
sponsored by HPE and Intel® Corporate
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel® Corporate

PowerEdge M1000e Blade Chassis
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this concise white paper to find out the key features of this blade chassis that will help you construct your IT infrastructure, as well as a complete list of its technical specifications.
Posted: 19 Feb 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

How to Adapt to the Dynamics of the Virtual Workforce
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive paper takes an in-depth look at an integrated solution stack from Dell that enables desktop virtualization, from pilots to full scale deployments, as a complete data center solution.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Dell, Inc. and Intel®

Comparing Solid-State Storage Architectures
sponsored by NetApp
WHITE PAPER: Access this white paper to compare two solid-state storage systems, and decide if one is right for your business.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

NetApp

Computer Weekly – 7 June 2016: Apple lures open source developers with Swift
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Apple's plan to woo open source developers to its Swift programming language. DevOps practitioners are warning of growing stress on IT operations staff through the growth of continuous development practices. And Specsavers' CIO tells us why the store is a vital part of digital retail. Read the issue now.
Posted: 03 Jun 2016 | Published: 07 Jun 2016

ComputerWeekly.com

Effective print management
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom offer tips on developing an effective print management strategy.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Printing: a false sense of security?
sponsored by ComputerWeekly.com
ANALYST REPORT: Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

ComputerWeekly.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Managed Print Services Landscape, 2015
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca examines the competitive landscape for Managed Print Services and discusses the key market drivers and trends that will shape future generation MPS engagements.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

ComputerWeekly.com

Service excellence and Managed Print Services
sponsored by ComputerWeekly.com
ANALYST REPORT: First class service and support is essential in a managed print service, say analysts Louella Fernandes and Clive Longbottom.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

ComputerWeekly.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

CW+: Quocirca report: Predictive service excellence for printers
sponsored by ComputerWeekly.com
WHITE PAPER: Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading.
Posted: 21 Oct 2011 | Published: 21 Sep 2010

ComputerWeekly.com

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

A Sustainable Print Agenda
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom recommend strategies for achieving a cost-effective, reliable and sustainable print infrastructure.
Posted: 02 May 2014 | Published: 02 May 2014

ComputerWeekly.com

Kodak Alaris Partner Program for Information Management
sponsored by TechData - Kodak
WHITE PAPER: To keep up with exploding data volumes, complicated by a mix of paper and digital resources, find out how to make sure you have the right partner and hardware in place – from printers to scanners and fax.
Posted: 04 May 2017 | Published: 28 Feb 2017

TechData - Kodak

Kodak Alaris 2017 Partner Playbook
sponsored by TechData - Kodak
WHITE PAPER: Disruptive digital transformation trends touch on every area of technology – including document capture. To keep up with exploding data volumes, complicated by a mix of paper and digital resources, find out how to make sure you have the right partner and hardware in place – from printers to scanners and fax.
Posted: 04 May 2017 | Published: 04 May 2017

TechData - Kodak

Closing the print security gap
sponsored by ComputerWeekly.com
WHITE PAPER: This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

ComputerWeekly.com

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by SearchSecurity.com
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Mobile Configuration Management Functions for Successful MDM
sponsored by SearchSecurity.com
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement