Hardware  >   Electronic Components  >   Discrete Component Interconnection  >   Buses  >  

Universal Serial Bus

RSS Feed    Add to Google    Add to My Yahoo!
Universal Serial BusReports
 
HP - rp5700 Point of Sale System
sponsored by Hewlett-Packard Company
DATA SHEET: The HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office.
Posted: 18 Mar 2008 | Published: 01 Aug 2008

Hewlett-Packard Company

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Trusted Computing: What the Future Looks Like
sponsored by Wave Systems Corp.
VIDEOCAST: Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries.
Posted: 15 Sep 2010 | Premiered: Sep 15, 2010

Wave Systems Corp.

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Gone in a Flash
sponsored by Information Security Magazine
JOURNAL ARTICLE: From USB drives to MP3 players to DVDs, portable storage media are an end user's dream and a security manager's nightmare. We evaluated six device control tools that can help you rest easier.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Information Security Magazine

How to Achieve Device Control Peace of Mind
sponsored by Lumension
CASE STUDY: Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Lumension

EK1000 Slap Shot Evaluation Kit Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This brief provides IT administrators with key information on how to manage their PC environments with and maximize end-user productivity.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Citrix XenApp 5.0: Preparing for a Successful Migration
sponsored by visionapp
WHITE PAPER: Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

visionapp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement