HIT Consultant Insightful coverage of healthcare innovation
 

remote

Results 476 - 500 of 743Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
    
Citrix
Published By: Polycom     Published Date: Dec 18, 2014
Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. Download the full survey report and discover why 85% of our respondents believe video conferencing helps them achieve their business goals, and find out how you can use technology to defy distance within your organization as well.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom
Published By: Epson     Published Date: Jun 22, 2018
Businesses like yours rely on e ective internal and external connections between employees to operate e ciently. But you might be discovering that the old ways of conveying important business messages are no longer enough for your sta . Relying only on telephone calls, email, and face-to-face meetings alone could be now considered a competitive disadvantage. It also makes it more di cult to attract top talent, and inhibits the communication speed most enterprises now require.
Tags : 
    
Epson
Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage
    
Intel
Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery
    
Silver Peak
Published By: Silver Peak     Published Date: Oct 28, 2013
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
silver peak, data, data replication, remote, optimize, rpo, business operations
    
Silver Peak
Published By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : 
remote files sharing, samba, ssh tunnel, nusphere
    
NuSphere
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv
    
Texas Instruments
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems
Published By: Intel Corp.     Published Date: May 11, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: May 15, 2018
Intel's factories rely on thousands of PCs for manufacturing automation; keeping these PCs up and running can prevent expensive downtime. To manage these systems, Intel IT is using the Intel vPro platform's hardware- based feature, Intel Active Management Technology (Intel AMT), to help reduce production downtime caused by PC incidents by 87.5 percent.
Tags : 
    
Intel Corp.
Published By: Intel     Published Date: Aug 10, 2012
CoreT vProT processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money
    
Intel
Published By: Raritan     Published Date: Jan 05, 2015
As an IT administrator, Lab, or Network Manager, you need to access and control multiple computer systems, perhaps widely dispersed, for routine maintenance as well as for real-time troubleshooting and repair. The tools must enable you to work quickly and securely to access any system regardless of type, brand, or location.
Tags : 
raritan, remote management, network management, data center
    
Raritan
Published By: Citrix Online     Published Date: Sep 08, 2010
Better Margins at a Fraction of the Cost.
Tags : 
citrix online technology, remote support, remote access
    
Citrix Online
Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: LogMeIn     Published Date: Jan 12, 2015
This report focuses on the remote support trends of 2014 and the available solutions for your business.
Tags : 
remote support trends, remote support platforms, logmein rescue
    
LogMeIn
Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Learn what you need to know before buying Remote Video Viewing technology
Tags : 
tyco, security, remote video, video conference
    
Tyco Integrated Security
Published By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
GGR Communications
Published By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
People for Business
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.