Infrared Wireless

RSS Feed    Add to Google    Add to My Yahoo!
Infrared Wireless Reports
25 Matches
Overview Of Near Field Communication
sponsored by ComputerWeekly.com
BOOK: This chapter from the book NFC Application Development for Android, offers an overview of NFC for Android developers.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

ComputerWeekly.com

CW+ Quocirca report: Reducing complexity and cost in mobile deployments
sponsored by ComputerWeekly.com
WHITE PAPER: The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Posted: 21 Oct 2011 | Published: 04 Oct 2010

ComputerWeekly.com

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

Citrix XenMobile and Windows 10 - Unified Endpoint Management in a mobile, cloud enabled world
sponsored by Citrix
WHITE PAPER: With version 10, Windows has moved the once desktop operating system firmly into the era of the mobility and the cloud. Download this white paper to discover Windows 10 management and security features supported by XenMobile.
Posted: 17 Mar 2017 | Published: 17 Mar 2017

Citrix

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

802.11n Primer
sponsored by Aerohive Networks
WHITE PAPER: In this paper, we will look at the basic elements of 802.11n functionality, with an emphasis on how it differs from WLAN technologies in use today. Our primary focus will be on the major methods that 802.11n uses to deliver on the claim of large increases in throughput and reliability.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

Aerohive Networks

Gone in a Flash
sponsored by Information Security Magazine
JOURNAL ARTICLE: From USB drives to MP3 players to DVDs, portable storage media are an end user's dream and a security manager's nightmare. We evaluated six device control tools that can help you rest easier.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Information Security Magazine

Top 3 Questions for Mobile Computer Purchases
sponsored by Intermec
WHITE PAPER: This white paper provides the top three questions you must ask before making a mobile computer purchase.
Posted: 25 Oct 2007 | Published: 01 Mar 2007

Intermec

Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company
WHITE PAPER: Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.
Posted: 19 Oct 2009 | Published: 07 Mar 2007

ArcSight, an HP Company

McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution
sponsored by McAfee, Inc.
WHITE PAPER: This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

McAfee, Inc.

Mobile Device Security: Emerging Threats, Essential Strategies
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

The Time to Buy into the Mobile Experience is Now
sponsored by Toshiba
WHITE PAPER: Find out how to achieve a well-oiled mobile strategy that gives you the ability to engage with your customers, while enhancing their shopping experience.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Toshiba

Applications, Virtualization, and Devices: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important to control unauthorized applications and devices, discusses the different approaches and highlights how integrating this functionality into malware protection is the simplest and cost-effective solution.
Posted: 02 Oct 2008 | Published: 23 Sep 2008

Sophos, Inc.

What You Need to Know About Real-Time Location Systems in Healthcare
sponsored by Ekahau, Inc.
WHITE PAPER: This white paper explores how real-time location systems (RTLS) can automate your inventory process by identifying and tracking the location of healthcare equipment in real time. Access now to learn how you can also enhance the safety of patients by keeping track of their whereabouts with RTLS.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Ekahau, Inc.

Open Information Security Management Maturity Model (O-ISM3)
sponsored by ComputerWeekly.com
WHITE PAPER: The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Musings on data centres – volume 2
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analyst Clive Longbottom discusses the key issues in managing and designing datacentres, in this series of 12 articles.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

IT Handbook: Energy Efficient Cooling
sponsored by SearchDataCenter.com
EBOOK: This expert handbook explains how to set up a data center cooling monitoring system, while looking at how increasing server inlet temperatures can optimize cooling efficiency and outlines methods for building hot-aisle/cold-aisle containment systems. Lastly, explore detailed criteria for selecting and implementing economizers in your data center.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

SearchDataCenter.com

4 Use Cases Show Real-World Impact of IoT
sponsored by SAS
WHITE PAPER: The IoT can bring big benefits. But how can retailers, the auto industry, government organizations, and manufacturers even begin to take advantage of it? Learn how these industries are squeezing value out of the IoT with analytics tools designed to stream source data and identify patterns in real time.
Posted: 24 May 2017 | Published: 24 May 2017

SAS

Technology, media and telecommunications predictions 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 11 Jan 2017 | Published: 11 Jan 2017

ComputerWeekly.com

Musings on datacentres
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Clive Longbottom discusses the key issues in managing and designing data centres.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Planning for the Security Features of Windows 7 Professional
sponsored by Dell, Inc. and Microsoft Windows 7
ANALYST REPORT: With Windows 7 Professional, Microsoft has added and extended many security capabilities in its flagship Windows operating system (OS). Deciding which features to activate as well as testing will impact the planning for every Windows 7 rollout. This analyst report will analyze the major security capabilities of Windows 7 in order of importance.
Posted: 14 Dec 2009 | Published: 21 Oct 2009

Dell, Inc. and Microsoft Windows 7

Energy Efficient Cooling: IT Handbook
sponsored by Schneider Electric
EBOOK: In this e-book, you'll learn about setting up a cooling monitoring system, optimizing data center cooling efficiency, using hot aisle/ cold aisle containment systems, and economizer selection and implementation.
Posted: 03 May 2010 | Published: 30 Apr 2010

Schneider Electric
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement