IT Systems  >   Communications Systems  >   Television Systems  >  

Closed-circuit TV

RSS Feed   
Closed-circuit TV Reports
 
Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 12 Aug 2019 | Published: 13 Aug 2019

ComputerWeekly.com

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola, Inc.
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola, Inc.

Banking on Business Continuity: UCaaS and Disaster Recovery
sponsored by 8x8, Inc.
WEBCAST: Live Oak Bank is an innovative, technology-enabled virtual bank. Learn about their transition from legacy technology to UCaaS and the benefits they experienced in this podcast.
Posted: 02 Aug 2019 | Premiered: Aug 2, 2019

8x8, Inc.

Small Spaces, Big Outcomes: Video Collaboration in Huddle Rooms
sponsored by AVI-SPL
WHITE PAPER: As the workplace continues to transform, it has become clear that smaller spaces can yield big outcomes. Learn about transforming workplaces to accommodate video collaboration solutions, and the different ways it can help you in this white paper.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

AVI-SPL

Unraveling the AIOps Mystery
sponsored by Kentik
EGUIDE: Inside this guide, editors from SearchITOperations.com seek to unravel the mystery behind AIOps offerings – and offer some AIOps deployment tips in the process.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Kentik

Are Your Communications At Risk?
sponsored by Verizon
WHITE PAPER: Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Verizon

Unpacking the True Value of Desktop Automation
sponsored by NICE & Converge One
WHITE PAPER: A key digital transformation technology, desktop automation is designed to work hand-in-hand with human employees and give them the means to focus on high-value tasks. Dive into this report to take a closer look underneath the hood of desktop automation deployments.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

NICE & Converge One

Tips and Tactics for Sparking a Mobile Workforce
sponsored by Verizon
WHITE PAPER: Being productive away from the office is about more than having a smartphone and a laptop. It's about having access to the right tools, the right information and the right contacts—all in a format that meets the particular challenges of the mobile worker. Read this white paper for tips on how to maintain an efficient mobile workforce.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

Verizon

Essential Elements for a Successful Digital Transformation
sponsored by ServiceNow
WHITE PAPER: Under the pressures of digital transformation, IT departments around the world are scrambling to find innovative new ways to support business growth. Download this white paper to learn about the three essential elements that comprise every successful digital transformation strategy – and how to incorporate them into your own.
Posted: 26 Aug 2019 | Published: 26 Aug 2019

ServiceNow

CW ASEAN: European data law - be aware and prepare
sponsored by ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

Media Conversion in Video Security and Surveillance Systems
sponsored by Transition Networks, Inc.
WHITE PAPER: This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Transition Networks, Inc.

Watch It: How to Do Video Surveillance for a Higher ROI
sponsored by Cisco Systems, Inc.
WHITE PAPER: Video surveillance helps keep an eye on things. But what is its return on investment (ROI) at your business? The technology that you use determines the value you can get. In comparison to cloud-circuit television (CCTV), the increasingly popular digital IP video surveillance offers more ROI. Continue reading this paper to find out why.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

Personalized Video Experiences
sponsored by Motorola, Inc.
WHITE PAPER: This paper explains various topics like: MPEG-4 Wins the Battle of the Bandwidth, How to Succeed in Targeted Advertising, Changing Times for Video On Demand, Modular Uplink System and Making the Change to Switched Digital Video.
Posted: 05 Jan 2009 | Published: 31 Dec 2008

Motorola, Inc.

Deconstructing unstructured data
sponsored by DellEMC and Intel®
WHITE PAPER: Use this expert paper to help deconstruct unstructured data. Learn why flexibility and value are the best answers for uncontrolled growth, and how to manage unstructured data through an optimized storage infrastructure.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

DellEMC and Intel®

How Can You Avoid a Web Security Breach? It's All in the Preparation
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

SearchSecurity.com

A Quick History of IoT Botnets
sponsored by Radware
WHITE PAPER: Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.
Posted: 22 Feb 2018 | Published: 22 Feb 2018

Radware

Security and High Availability in Cloud Computing Environments
sponsored by IBM
WHITE PAPER: Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Take a look at this exclusive resource to learn how adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Security and high availability in cloud computing environments
sponsored by IBM
WHITE PAPER: This white paper provides a comprehensive overview of cloud benefits and points out risks that businesses should be aware of before getting started. Explore a framework designed to help you overcome security related concerns and ensure high availability in your cloud environment.
Posted: 05 Mar 2012 | Published: 01 Jun 2011

IBM

Juniper Networks EX4200 Line of Switches Deliver True Chassis Functionality in a Stackable Form Factor
sponsored by Juniper Networks, Inc.
WHITE PAPER: Legacy Ethernet switches fail to meet emerging requirements. The Juniper Networks EX4200 line of Ethernet switches with Virtual Chassis technology combine the best of stackable and chassis-based switches.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Juniper Networks, Inc.

Data Security in the E-discovery Process
sponsored by SearchCompliance.com
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

SearchCompliance.com

IBM Point of View: Security and Cloud Computing
sponsored by IBM
WHITE PAPER: Cloud Computing is easy to deploy, flexible and cost-effective.  As federal agencies continue to outsource data management and operations to third-party cloud providers, their ability to ensure data integrity and privacy is becoming a potential security risk. Read this white paper to learn how you can manage Cloud Computing safely and efficiently.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

IBM

IBM POV: Security & Cloud Computing
sponsored by IBM
WHITE PAPER: You may be turning to cloud computing solutions to provide flexible, cost-effective and proven delivery of IT services. This white paper shows how cloud resources can be rapidly deployed and easily scaled and processes, applications and services can be provisioned “on demand,” regardless of user location or device.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Presentation: The BBC’s Unified Communications Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

ComputerWeekly.com

The Changing Face of Cyber Attacks
sponsored by Neustar
WHITE PAPER: The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.
Posted: 17 Jan 2019 | Published: 07 Jan 2019

Neustar

Virtual Data Centre UK E-zine Volume 1: How to build an internal, private cloud
sponsored by SearchVirtualDataCentre.co.UK
EZINE: Once you make the decision to deploy the cloud, you must then make several important decisions along the way. This expert e-zine provides an in-depth overview of the cloud implementation process, covering private cloud pros and cons, selecting a service provider, and more.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

SearchVirtualDataCentre.co.UK

FM, IT and Data Centres
sponsored by ComputerWeekly.com
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

E-Book: Technical Guide on PCI
sponsored by SearchSecurity.com
EBOOK: TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
Posted: 14 Oct 2011 | Published: 10 Oct 2011

SearchSecurity.com

Tera1100 PC-over-IP Portal Processor Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: The TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Getting Down to Business with Mobile APM
sponsored by SearchNetworking.com
EZINE: Mobile APM matures with more granular visibility than ever for mobile apps. Also discover what's behind the big push for 25 Gigabit Ethernet, plus new uses for SDN in wireless.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

SearchNetworking.com

Top Five Ways to Cut Corporate-Liable Mobile Costs
sponsored by Dimension Data
WHITE PAPER: In this resource, discover how mobile security really starts from mobile device management. Click now to unveil 5 best practices to reduce complexity in mobile environments so that you can improve vulnerability monitoring capabilities.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Dimension Data

Transforming Mission Critical computing
sponsored by Dell, Inc. and Intel®
PRODUCT OVERVIEW: This product brief showcases a processor that improves mission-critical reliability and optimizes the performance of your most demanding applications. Learn about its key features as well as how this platform has evolved over time.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

Dell, Inc. and Intel®

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement