pcs

Results 126 - 150 of 152Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Intel® CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Find the Intel® laptop processor to meet your business needs with this interactive laptop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management
    
Intel
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, knowledge management, data management, productivity, project management, desktop management
    
Dell Software
Published By: Silverpop     Published Date: Jun 15, 2012
The way we communicate is moving-literally. Smart phones are outselling PCs, and tablet sales are expected to outpace desktop sales by 2013. But although the screens may be smaller, the possibilities for engagement are larger than ever.
Tags : 
marketing, silverpop, email, mobile marketing, social media, emerging marketing, social media platforms
    
Silverpop
Published By: Toshiba     Published Date: Jun 06, 2012
Your staff will be more content if they can install their choice of software. Here's how to give them that freedom while keeping control.
Tags : 
toshiba, mfp, printers, copiers, printers, employees, laptops, it management, mobile workers, employee laptops, small business networks, workforce management, employee performance, productivity, desktop management
    
Toshiba
Published By: Forrester     Published Date: May 10, 2012
More people own smartphones than ever before and they're using them more often too. This makes a mobile marketing strategy crucial for any interactive marketer. Yet today we find that although mobile budgets are beginning to increase, the majority of interactive marketers are just starting to experiment, and many still treat mobile phones as mini-PCs. This report explains how marketers at each phase of mobile marketing evolution should craft successful mobile campaigns by hewing to three key principles: immediacy, simplicity, and context.
Tags : 
emerging methods, brand tactics, mobile channel for consumers, ecommerce, consumer mobile activities, mobile marketing, media mix, emerging media, consumer mobile devices, mobile advertising
    
Forrester
Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security, intrustion detection, anti-virus, access control, anti virus, application security, hacker detection, security management
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
Regardless of whether your organization uses Windows-based PCs or Macs or a mix of both, you need a solution that provides protection for all operating systems. Read to learn more.
Tags : 
gfi software, hacker detection, security, technology, data protection, intrusion detection, authentication, identity management, intrusion prevention
    
GFI Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Working closely with Absolute Software Chicago Public Schools is managing over 100,000 PCs, Macs, and iOS 4 devices and have recovered over 350 stolen computers allowing them to invest in the future (versus replacement computers).
Tags : 
school, education, budget, diversity, managing diversity, auditing, application integration, application performance management, business management, business process management, enterprise resource planning, it spending, analytical applications, configuration management, virtualization, cloud computing, infrastructure, design and facilities
    
Absolute Software
Published By: PC Mall     Published Date: Jan 31, 2012
While PCs deliver excellent value, versatility, and stability, workstations deliver ultimate performance, uncompromised reliability, and wide-ranging scalability, from entry-level up to extreme power users.
Tags : 
data management, data center
    
PC Mall
Published By: Silverpop     Published Date: Sep 19, 2011
The way we communicate is moving-literally. Smart phones are outselling PCs, and tablet sales are expected to outpace desktop sales by 2013. But although the screens may be smaller, the possibilities for engagement are larger than ever.
Tags : 
silverpop, social media, smart phones, marketing, customer engagement
    
Silverpop
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software
Published By: Iron Mountain     Published Date: Sep 24, 2010
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
Tags : 
iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage, virtualization, backup and recovery, ip storage, storage management, storage virtualization, mobile computing, mobile workers, wireless security, document management, information management, records management, search and retrieval
    
Iron Mountain
Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email
    
BlueHornet
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, analytical applications, configuration management
    
Absolute Software
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence, security, anti spam, anti spyware, anti virus, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management
    
ThreatMetrix.
Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers
    
Citrix
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was rapid growth. The pain points most often cited were manual processes that cause mistakes and inefficiencies, the need for more functionality, an inability to scale to support growth, integration problems, especially with the growing number of customer and partner systems, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support rapid growth and drive business success.
Tags : 
microsoft dynamics, crm, compliance, security, enterprise applications, customer relationship management
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance, enterprise applications, customer relationship management
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality, enterprise applications, customer relationship management
    
Microsoft Dynamics
Published By: Dell     Published Date: Oct 20, 2008
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.
Tags : 
dell, hardware asset recovery, safe hardware disposal, asset recovery, environmental liability, dell asset recovery services, security, platforms, disaster recovery, windows
    
Dell
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.