HIT Consultant Insightful coverage of healthcare innovation
 

computers

Results 1 - 25 of 151Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: Absolute Software     Published Date: Nov 21, 2011
With increased visibility into computers on and off their network, Allina Hospitals was able to optimize security and comply with regulations.
Tags : 
auditing, audit, accuracy, allina hospitials, allina, optimize security, security, regulations
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Chicago Public Schools (CPS) pursues a leading approach to integrating technology into the learning experience and provides students with access to computers throughout their education..
Tags : 
education, absolute, cps, chicago, integration
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : 
kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Alice Owen, Executive Director of Technology for Irving Independent School District, discusses how she effectively secures and tracks her district's 12,000 computers. Leonard Niebo, Director of IT for Brick Township Public Schools leads our discussion on overcoming the roadblocks of a manual auditing process, specialized computing needs and incidents of loss and theft.
Tags : 
securing, tracking, laptops, irving, security
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : 
apple, asset management, end users
    
Absolute Software
Published By: Adobe     Published Date: Oct 19, 2012
As consumers access online content on more devices - computers, smartphones, tablets and even gaming consoles - managing and delivering digital content has grown exponentially more complex. Learn how rethinking WCM will help you thrive in complexity.
Tags : 
mobile content management, cms, content management systems, wcm, web content management, mobile content planning, mobile applications
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
On 3 May 1978, Gary Thuerk sent an e-mail that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass e-mail inviting recipients to one of two West Coast product demos for a new line of computers.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Oct 10, 2016
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe stock, adobe creative cloud, cloud, integration
    
Adobe
Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
At 12:33 EDT on May 3, 1978, Gary Thuerk sent an email that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass email inviting recipients to one of two West Coast product demos for a new line of computers.1
Tags : 
    
Adobe
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication
    
Arcserve
Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code
    
Auth0
Published By: Ayla Networks     Published Date: Aug 11, 2015
The step from unconnected to connected products is a daunting one. Unlike the computers and smartphones and tablets we use to connect to the Internet of Computers, the devices of the IoT were rarely designed with connectivity in mind.
Tags : 
    
Ayla Networks
Published By: BlackBerry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Tablet computers are making significant inroads in the enterprise - and in a recent survey of over 150 executives, Research In Motion® explores which features are most important.
Tags : 
mobile enterprise, mobile computing platform, tablet, tablet computers, blackberry
    
Blackberry
Published By: CA Technologies     Published Date: Aug 24, 2017
We can quote innumerable stats to impress, but there is no need—it is apparent that the world is getting more connected. Today’s connectivity will seem primitive in a few years as the connectivity extends beyond smartphones, tablets and computers to concepts such as devices implanted in the human body.
Tags : 
    
CA Technologies
Published By: CDW     Published Date: Nov 12, 2012
As mobility becomes commonplace, strategies for wireless and wired security must be woven together.
Tags : 
cdw, wireless, wired, security, wlans, endpoints, notebook computers, tablets, smartphones
    
CDW
Published By: Centrify     Published Date: Sep 08, 2015
Read this IDC Buyer’s Case Study focused on how a prekindergarten through grade 12 school district located in Grand Island, Nebraska, implemented the Centrify Identity Service to integrate the school system's fleet of Mac computers with Active Directory and provide unified access management, authorization, password management, and authentication capabilities.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: Cisco     Published Date: Jan 28, 2009
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. The network operates by connecting computers and peripherals using two pieces of equipment; switches and routers. Switches and routers, essential networking basics, enable the devices that are connected to your network to communicate with each other, as well as with other networks. Though they look quite similar, routers and switches perform very different functions in a network.
Tags : 
cisco, networking basics, routing and switching, essential networking basics, switches, routers, virtual private network, vpn
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm. Businesses that embraced the Internet in its early days gained a significant advantage over their competitors; those that did not became irrelevant very quickly.
Tags : 
digital experience, internet, perfect storm, transformative effects, technology, computers, revolution, browsers, broadband
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The term “perfect storm” is used to describe when several forces come together and create a large, single event that has transformative effects. A technology perfect storm took place in the 1990s when Internet services, low-cost home computers, browsers and affordable broadband all came together and created the Internet revolution. This revolution launched an entirely new economic model that sparked new ways of doing business, changed the way we work, and allowed us to blend our personal and professional lives. At first, these new ways of working were the exception. But the transformation to an Internet-based work style is now complete, and this style has become very much the norm.
Tags : 
cisco, akaamai, customer experience, digital customer experience, enterprise, wan, integrated solutions, optimization
    
Cisco
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.