Hardware  >   Peripheral Hardware  >   Printers  >  

Portable Handheld Printers

RSS Feed   
Portable Handheld Printers White Papers (View All Report Types)
 
Easily Print From Any Mobile Device
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This crucial white paper discusses a printing solution that allows you to easily add wireless direct printing and touch-to-print technology to your printer or MFP, allowing the entire office to print from their mobile devices.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Hewlett-Packard Enterprise

Secure Mobile Printing for Business
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative white paper discusses how your organisation can enable reliable printing from any mobile platform or operating system while still providing IT administrators the control over network access and output to protect confidential information.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Hewlett-Packard Enterprise

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution
sponsored by Red Hat and Intel
WHITE PAPER: This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Red Hat and Intel

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 25 Apr 2011 | Published: 30 Nov 2010

Oracle Corporation

Policy-based Compliance Protects Enterprise Imaging and Printing Data
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise

Mobile RFID Readers: Read Points That Move with Your Assets
sponsored by Motorola, Inc.
WHITE PAPER: Tracking inventory with RFID just got easier. Read this white paper to see how mobile RFID read points are helping increase visibility for company inventory and other assets, regardless of where it is in the supply chain.
Posted: 05 Jun 2007 | Published: 01 Mar 2007

Motorola, Inc.

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

The ClearPass Access Management System
sponsored by Aruba Networks
WHITE PAPER: This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.
Posted: 22 May 2013 | Published: 22 May 2013

Aruba Networks

EtherScope Series II Network Assistant
sponsored by Fluke Networks
PRODUCT DEMO: EtherScope Series II Network Assistant helps first responders solve network problems on both sides of the access point - fast. This virtual demo will show you an ideal portable platform for rogue hunting and troubleshooting.
Posted: 01 Jun 2007 | Premiered: 01 Jan 2006

Fluke Networks

Computer Weekly buyer's guide to business tablets
sponsored by ComputerWeekly.com
EBOOK: This in-depth buyer's guide, looks at tablets for business needs and the balance companies need to strike between corporate control and user choice.
Posted: 02 May 2014 | Published: 02 May 2014

ComputerWeekly.com

Increasing Productivity with Mobile Business PCs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: After investigating various options, Intel IT selected mobile PCs as the standard computing platform. Mobile business PCs, by nature, are highly portable and their robust feature set provides productivity advantage to employees, while meeting a majority of the company's diverse requirements.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Dell, Inc. and Intel®

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

MicroScope February 2014: A special issue looking at managed print services
sponsored by MicroScope
EZINE: An issue highlighting the opportunities in managed print services, the storage market and investigating the impact of Scottish independence.
Posted: 12 Feb 2014 | Published: 13 Feb 2014

MicroScope

Best Practices for Managing Endpoints in the Era of Consumerization
sponsored by SearchMobileComputing
EBOOK: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

SearchMobileComputing

A themed issue looking at the latest trends in print management
sponsored by MicroScope
EZINE: A themed issue of the ezine looking at the opportunities for the channel in the managed print world
Posted: 02 Sep 2016 | Published: 02 Sep 2016

MicroScope

CIO Perspective: BlackBerry Security
sponsored by BlackBerry
WHITE PAPER: In this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure.
Posted: 08 Nov 2006 | Published: 19 Oct 2006

BlackBerry

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

Manage it all, better - HP Mobility Solutions for SAP
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: The following white paper explores the new mobility trend and how it is transforming the way retailers do business. Uncover the technology that makes handling the shift easier by allowing businesses to create unique functionality with retail websites and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Hewlett-Packard Enterprise

MicroScope September 2011: A special issue examining the security market
sponsored by MicroScope
EZINE: Security has remained a good market for the channel to be involved in with the threats continuing to evolve and customers being forced to keep their budgets high in order to maintain protection. Not only are the threats evolving but so are the challenges to channel customers. Continue reading this e-zine to learn more.
Posted: 16 Sep 2011 | Published: 21 Oct 2011

MicroScope

Mobile device protection: tackling mobile device security risks
sponsored by SearchSecurity.com
EGUIDE: The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

SearchSecurity.com

Do Mobile Users Need Full Desktop Access?
sponsored by VMware, Inc.
EGUIDE: In this expert guide from SearchVirtualDesktop.com, Scott Davis, Chief Technology Officer for VMware, discusses the role of desktop virtualization in the mobile world - and what role it will continue to play in the future.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

VMware, Inc.

Consumer Technology in the Enterprise - a Computer Weekly Buyer's Guide
sponsored by ComputerWeekly.com
WHITE PAPER: The pressure to allow employees to use more of the technologies they have at home in the workplace has reached critical levels.
Posted: 20 Oct 2011 | Published: 24 Mar 2011

ComputerWeekly.com

Five Calls to Make When Developing a Mobile Learning Strategy
sponsored by Skillsoft
WHITE PAPER: This brief resource provides tips for deploying mobility in the workplace.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
sponsored by SearchHealthIT.com
EBOOK: Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

SearchHealthIT.com

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by SearchSecurity.co.UK
EBOOK: Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

SearchSecurity.co.UK

Enhanced Wi-Fi Companion: A Complete Wi-Fi Solution for Business Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: Businesses that want to deploy Pocket PCs or other Windows Mobile/CE based devices on their Wi-Fi networks will benefit from a solution that incorporates the latest data security and Wi-Fi innovations, CCX certification, and a user-friendly interface in a single, complete solution without third-party supplicants.
Posted: 25 Oct 2011 | Published: 08 Jun 2010

ComputerWeekly.com

Rapidly Deployable Network for Corporate Pop-Up Health Checkpoints
sponsored by Cradlepoint
DATA SHEET: As employees start returning to workplaces, many organizations are setting up health and wellbeing checkpoints outside their facilities. They need mission-critical mobile and on-site networks to keep the technology always connected. In this brief, learn how Cradlepoint can help make this possible with secure, reliable LTE connectivity.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Cradlepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info