Infrared Wireless

RSS Feed    Add to Google    Add to My Yahoo!
Infrared WirelessWhite Papers (View All Report Types)
25 Matches
Overview Of Near Field Communication
sponsored by ComputerWeekly.com
BOOK: This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

ComputerWeekly.com

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

CW+ Quocirca report: Reducing complexity and cost in mobile deployments
sponsored by ComputerWeekly.com
WHITE PAPER: The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Posted: 21 Oct 2011 | Published: 04 Oct 2010

ComputerWeekly.com

Lumension Guide to Device Control Best Practices
sponsored by Lumension
WHITE PAPER: This white paper provides a practical guide to assist you with the deployment of a device control module as part of your endpoint security management. Learn how you can prevent malware, ensure data protection and more.
Posted: 17 Sep 2012 | Published: 14 Sep 2012

Lumension

Open Information Security Management Maturity Model (O-ISM3)
sponsored by ComputerWeekly.com
WHITE PAPER: The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Musings on data centres – volume 2
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analyst Clive Longbottom discusses the key issues in managing and designing datacentres, in this series of 12 articles.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

IT Handbook: Energy Efficient Cooling
sponsored by SearchDataCenter.com
EBOOK: This expert handbook explains how to set up a data center cooling monitoring system, looks at how increasing server inlet temperatures can optimize cooling efficiency and outlines methods for building hot-aisle/cold-aisle containment systems.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchDataCenter.com

Musings on datacentres
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Clive Longbottom discusses the key issues in managing and designing data centres.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

Plantronics Wireless Density: Whitepaper
sponsored by Insight and Plantronics
WHITE PAPER: This white paper breaks down the four considerations that must be dealt with when installing wireless headsets.
Posted: 12 Nov 2013 | Published: 12 Nov 2009

Insight and Plantronics

The CIO's Guide to Wireless in the Enterprise
sponsored by BlackBerry
WHITE PAPER: Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with business mobility and where to find additional resources for consideration.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

BlackBerry

E-Book: Engineering the Wireless Hospital
sponsored by SearchHealthIT.com
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

SearchHealthIT.com

Engineering the Wireless Hospital
sponsored by CDW Healthcare
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this CDW Healthcare e-book to learn how these obstacles can be eliminated.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

CDW Healthcare

Engineering the Wireless Hospital
sponsored by Aerohive Networks
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Aerohive Networks

Securing End-User Mobile Devices in the Enterprise
sponsored by IBM
WHITE PAPER: As your mobile enterprise expands and devices grow more robust, security risks increase. With careful preparation, you can use the latest tools and expertise to protect your assets. Read this white paper to learn how to develop an enforceable mobile security policy for your organization.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

OneBridge Mobile Groupware, 5.5
sponsored by Sybase iAnywhere
TRIAL SOFTWARE: Ensuring your wireless email and other data is secure anytime, anywhere is a challenge. OneBridge 5.5 can help you deliver vital data over any connection, to any device or using Lotus Domino.
Posted: 23 Aug 2006 | Premiered: 23 Aug 2006

Sybase iAnywhere

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

Policy Reference Guide: Blackberry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: Devices that are running the BlackBerry Application Suite can use all the IT policy rules that are associated with the supported features of the BlackBerry Application Suite.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

Beyond barcodes and RFID: WiFi,RTLS, and other next-gen sensor technologies for manufacturing
sponsored by IQMS
EGUIDE: In this eBook, read expert advice on finding the right mix of next generation wireless sensor technologies for every warehouse and shop floor.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

IQMS

Enterprise Mobility: A Framework for Success
sponsored by Dimension Data
BOOK: Get further insight into the most recent developments in enterprise mobility, so you can prepare for your own deployment.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Dimension Data

The Future Of Mobile Application Development
sponsored by Salesforce.com
ANALYST REPORT: This  report focuses on the changes application developers need to understand if they want to build modern applications that deliver contextual customer experiences. It also looks at how modern applications will evolve over the next few years and what development teams should prepare for now.
Posted: 29 Jul 2013 | Published: 17 Jan 2013

Salesforce.com

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

ComputerWeekly.com

Virtual Data Center E-Zine Vol. 38 The Data Center of the Future
sponsored by SearchServerVirtualization
EZINE: Transitioning to the virtual data center involves taking into account many trends that are just beginning to take off, such as cloud computing, IT consumerization and Big Data. In this expert e-zine, explore how you can take steps to embrace these new technologies and improve the efficiency of your data center.
Posted: 10 Apr 2012 | Published: 06 Apr 2012

SearchServerVirtualization
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement