HIT Consultant Insightful coverage of healthcare innovation
 

computers

Results 26 - 50 of 150Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : 
kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: Jamf     Published Date: Mar 29, 2018
With Mac labs being a major presence on university campuses, many IT admins rely on imaging to ensure computers do not fall prey to viruses and costly data breaches, and to provide students with the education resources they need to be successful. The problem is imaging machines is a tedious and manual process, requiring lots of IT time. In this white paper, we examine a better way to manage a Mac lab and explain how to: • Leverage Apple’s Device Enrollment Program (DEP) to automatically configure and enroll Mac devices into management • Make apps and resources readily available for students to use, regardless which computer they choose • Ensure students only have access to the resources relevant to them by binding machines to your school’s directory services system
Tags : 
    
Jamf
Published By: Sophos     Published Date: Mar 30, 2017
Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read this paper to learn more about exploits and how to stop them. We’ll explore how exploits work, the exploit industry overall, what makes a good exploit in the eyes of the cybercriminals, and also how anti-exploit technology is a highly efficient and effective way to secure your organization against advanced and unknown threats.
Tags : 
malware, antivirus solutions, exploit protection, security software, exploit kits, software protection, backdoor protection
    
Sophos
Published By: Citrix Systems     Published Date: Jan 29, 2013
Client virtualization technologies properly matched to work styles provide an effective means of accelerating the BYOC program by allowing you to provide a standardized, well-managed desktop environment on employee-owned computers and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone
    
Citrix Systems
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : 
benefits, server, small business
    
Dell & Microsoft
Published By: Cox Communications     Published Date: Nov 10, 2014
Business phone systems may not attract the same attention or achieve the same acclaim that computers, smart phones and tablets regularly receive. You won’t hear of too many publicized conferences or Twitter trends but that does not negate their importance.
Tags : 
twitter, evolving features, business phone service, cox, functionality
    
Cox Communications
Published By: Oracle     Published Date: Mar 01, 2019
When computers learn about humans
Tags : 
    
Oracle
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Published By: Oracle     Published Date: Jan 08, 2019
When Computers Learn About Humans
Tags : 
    
Oracle
Published By: VMware Dell     Published Date: Jul 02, 2008
Many companies have turned to virtualization technologies for their servers and in their data centers to simplify administration and to reduce management chores and operating costs while maintaining reliability and safeguarding against disasters. Seeing the significant benefits virtualization delivers in those environments, companies are now looking to apply the same technology to their desktop computers.
Tags : 
desktop management, desktop, virtualization, virtual infrastructure, vmware
    
VMware Dell
Published By: VMware Dell     Published Date: Jul 02, 2008
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits and limitations of these technologies as well as the best use cases for each, exemplified through user case studies.
Tags : 
desktop, desktop virtualization, virtualization, virtual machine, vmware, vmware ace, vmware vdi
    
VMware Dell
Published By: Dell & Microsoft     Published Date: Mar 13, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : 
dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
    
Dell & Microsoft
Published By: Cray Inc.     Published Date: Aug 21, 2014
Learn how to optimize codes for faster application performance with Intel® Xeon® Phi™ coprocessor.
Tags : 
optimization, nics, supercomputers, application, performance, hybrid processing
    
Cray Inc.
Published By: Lenovo and Intel®     Published Date: Jan 19, 2017
Getting students engaged in the classroom is always challenging. Keeping them engaged is often the more difficult battle! Windows 10 Pro paired with innovative Lenovo tablet, laptop, and desktop computers provides the perfect user experience-driven solution?—?where technology is never a constraint to innovation or engagement. Download this eBook and learn more.
Tags : 
    
Lenovo and Intel®
Published By: insightsoftware     Published Date: Oct 19, 2018
Over the past few decades, technology has advanced by leaps and bounds, altering how we live and work. As machines take over certain jobs for safety or improved accuracy, some are concerned that technology will eventually replace people. But as businesses incorporate machines and technology deeper into workplaces, it is evident that a mindset shift needs to occur. The working world must find ways to incorporate technology so that people do what people do best, while allowing computers to do what computers do best. It’s time to think differently about technology. It’s time to make technology part of the team. To download this white paper, please complete the following form.
Tags : 
    
insightsoftware
Published By: HP - Enterprise     Published Date: Feb 06, 2013
We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data.
Tags : 
big security, big data, secure data
    
HP - Enterprise
Published By: MicroStrategy     Published Date: May 15, 2014
MicroStrategy, a global innovator of mobile solutions, recently surveyed 500 U.S. organizations on the use of tablet computers to support sales activities across a large, diverse group of industries. The survey results suggested many companies are facing significant hurdles to sales enablement related to the limitations of their internal sales systems, which are largely not equipped for enabling sales processes out of the office. Find out how innovative companies are enabling their sales reps to be 10X more effective with mobile sales enablement apps.
Tags : 
mobilestrategy, mobile solutions, tablets, sales enablement, mobile sales, enablement apps, sales force
    
MicroStrategy
Published By: Ayla Networks     Published Date: Aug 11, 2015
The step from unconnected to connected products is a daunting one. Unlike the computers and smartphones and tablets we use to connect to the Internet of Computers, the devices of the IoT were rarely designed with connectivity in mind.
Tags : 
    
Ayla Networks
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: Google Cloud     Published Date: Aug 17, 2017
Breakthroughs in artificial intelligence (AI) have captured the imaginations of business and technical leaders alike: computers besting human world-champions in board games with more positions than there are atoms in the universe, mastering popular video games, and helping diagnose skin cancer. The AI techniques underlying these breakthroughs are finding diverse application across every industry. Early adopters are seeing results; particularly encouraging is that AI is starting to transform processes in established industries, from retail to financial services to manufacturing.
Tags : 
    
Google Cloud
Published By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
    
Veeam '18
Published By: Riverbed     Published Date: Apr 24, 2015
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era. Read this white paper to learn more about the need for location-independent computing.
Tags : 
hybrid enterprise, location-independent computing, enterprise it, computing platform, cloud computing, mobile devices
    
Riverbed
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.