Hardware  >  

Peripherals

RSS Feed    Add to Google    Add to My Yahoo!
Peripherals White Papers (View All Report Types)
 
Closing the print security gap
sponsored by ComputerWeekly.com
WHITE PAPER: This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

ComputerWeekly.com

Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies

Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone?
sponsored by Sensaphone
WHITE PAPER: This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

Sensaphone

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Green Computing beyond the Data Center - IT Briefing
sponsored by Faronics
WHITE PAPER: Organizations considering green computing initiatives start in the data center but the truth is that in many organizations more power and heat waste is generated outside of the data center. This white paper discusses seven actions that address the prob...
Posted: 28 Sep 2007 | Published: 01 Sep 2007

Faronics

Case Study: Building High-Availability Virtual Storage at a Low Cost
sponsored by Red Hat
WHITE PAPER: In this case study, discover how a large electronics company transformed their virtual storage strategy to reduce costs and enhance scalability.
Posted: 26 May 2015 | Published: 31 Dec 2014

Red Hat

Side By Side Comparison: SSD Architectures
sponsored by Solidfire
WHITE PAPER: Many companies are looking to upgrade to flash storage. However, there are a vast amount of flash storage arrays on the market. How can you choose the one that's right for you?Access this white paper for a side by side comparison of two all-flash arrays to help you decide on an array that's right for your business.
Posted: 07 Apr 2015 | Published: 30 Jun 2014

Solidfire

The Printer Playbook: Strategy and Insight for the Enterprise
sponsored by Hewlett-Packard Company
WHITE PAPER: This Printer Playbook explains why printer security should be part of your overall information technology strategy. It offers suggestions and resources to help businesses begin securing their networks.
Posted: 04 May 2015 | Published: 04 May 2015

Hewlett-Packard Company

Detailed Information on Popular Storage Platform
sponsored by IBM
WHITE PAPER: This white paper provides comprehensive information on one of the most widely used storage platforms.
Posted: 31 Mar 2015 | Published: 30 Nov 2014

IBM

Predictable Storage for an Unpredictable World
sponsored by IBM
WHITE PAPER: This infographic presents a storage platform that is cost-efficient, application optimized, and efficient enough for today's workloads.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement