pda

Results 276 - 300 of 409Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Nov 22, 2011
Today's competitive and fast-paced business environment requires that more people have access to real-time performance and status information, so they can make quick and intelligent decisions. The need for timely and succinct business intelligence continues to grow as executives demand critical information to seize opportunities faster than competitors and to address potential problems in the making. C-level executives and upper management aren't the only staff needing access to business intelligence. Business unit managers and rank-and-file personnel increasingly must also have updated information to do their jobs. This white paper discusses the features and benefits of next generation dashboards.
Tags : 
ziff davis enterprise, dashboards, business intelligence, technology, business trends, bi solutions, analytical applications, data protection, information management
    
SAP
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
During NSS Labs’ 2018 Advanced Endpoint Protection (AEP) Group Test, CylancePROTECT® and CylanceOPTICS™ v2.0.1450 failed to initiate part of the CylanceOPTICS engine, which primarily impacted the exploit and blended threats test categories. This affected the Cylance® position on the Security Value Map (SVM)™. After working closely with NSS, Cylance rolled out a new version of its software (v2.2.1011) for CylanceOPTICS. Cylance submitted this updated product for follow-on testing using the AEP Test Methodology v2.0, the same methodology used in the AEP Group Test. The product improved its Block Rate by 6.9% and its Additional Detection Rate by 0.2%. Learn more about the results in the NSS Labs testing report.
Tags : 
endpoint protection, cylance, security
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
Sooner or later, disasters happen to every computer user. They delete important files, on purpose or accidentally. Or they update a document and save it, overwriting the original version. Download this paper to learn how to protect against accidental file erasure.
Tags : 
user error, file erased, erase file, erased file, recover file, file recovery, delete file, file deleted, restore file, productivity, pibcac, restore document, diskeeper, disk keeper, diskkeeper, backup and recovery, best practices, windows, document management, desktop management
    
Diskeeper Corporation
Published By: BlackBerry     Published Date: May 03, 2010
Any IT person with a pulse knows that employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Notwithstanding the real productivity benefits from connected employees, until now many IT departments have turned down all such requests as a matter of policy. They calculated that the security and control risks outweighed the benefits from collaboration.
Tags : 
blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility, software costs, bluetooth, cdma, mobile computing, mobile data systems, smart phones, wifi, wireless communications, wireless infrastructure, wireless messaging, wireless phones, wireless security
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2010
Individually acquired smartphones - those devices that employees purchase outright or get reimbursed for by the organization - are on the rise.
Tags : 
blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility, software costs, mobile computing, mobile data systems, mobile workers, smart phones, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless security
    
BlackBerry
Published By: BlackBerry     Published Date: Jun 22, 2010
Fast, accurate communications are the underpinnings of patient care and safety. Yet, today's hospital staff carry so many pagers and other devices, it's become cumbersome. With Amcom Mobile Connect, you can simplify communications and strengthen care by using your BlackBerry smartphone for code alerts, patient updates, lab results, consult requests, and much more. In short, everything.
Tags : 
blackberry, smartphones, wireless, pda, pagers, healthcare, enterprise servers, it management, budget, mobility, software costs, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless communications, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
Published By: BlackBerry     Published Date: Aug 02, 2010
There is a communications revolution occurring in hospitals today. With highly mobile staff members and the increasing use of smartphones, new ways to share and act on information abound. Yet despite these technology changes, the need for fast, accurate messaging remains crucial to maintain patient safety at all times.
Tags : 
blackberry, healthcare, hospitals, smartphones, pda, mobile workers, mobile staff, integration, wifi, bes, mobile computing, mobile data systems, smart phones
    
BlackBerry
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management, security management, hipaa compliance, sarbanes oxley compliance
    
Information Shield
Published By: Intermec     Published Date: Jun 16, 2009
General-purpose PDAs and ruggedized enterprise mobile computers serve different markets and functions, and also vary by size, weight and materials. But the biggest difference is their total cost of ownership (TCO).
Tags : 
tco, total cost of onwership, pda, enterprise mobile computers, vdc, mobile devices, productivity, power management, device management, mobile computing, mobile data systems, total cost of ownership
    
Intermec
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates, human resources management, staffing, training and development
    
ZoomInfo
Published By: Apple Corporation     Published Date: Feb 26, 2015
Whether you need to view and approve, update and share, or create content from scratch, there are powerful apps that let you work on demand without skipping a beat in your business.
Tags : 
    
Apple Corporation
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, knowledge management, enterprise applications
    
Amazon Web Services, Inc
Published By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco
Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: HP     Published Date: Jul 22, 2014
The environment of stable growth has been replaced by one of explosive growth, and the IT infrastructure needs to be updated accordingly. This eBook will help you understand how new storage solutions can address these and other challenges facing organizations today.
Tags : 
storage, infrastructure, storage solutions, data management
    
HP
Published By: MineralTree     Published Date: Jan 14, 2015
Customer case study featuring Sand 9, a technology company that was able to streamline their AP process and gain insight and control of their outgoing cash flow.
Tags : 
mineraltree, implementation, modernize, payments, accounts, solution, update, training, business, streamline, management, security, personal finance, small business, finance
    
MineralTree
Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: IBM     Published Date: Sep 16, 2014
In 2013, Bon Ton Stores invested in upgrading IT, continuing to update and expand its eCommerce sites, and launching a new mobile site supporting delivery of promotions and online purchasing. A central aspect of this technology upgrade involved the replacement of an x86 server environment, supporting eCommerce with ten IBM® PowerLinux™ 7R2 servers and IBM PowerVM® running IBM WebSphere® Commerce on SUSE Linux operating systems. This case study highlights of some of the key aspects of this significant migration and its results, including how Bon-Ton IT executives support the business and what they prioritize, why they decided to make this move, what performance and capability resulted, and how it affected full data center costs and business resilience.
Tags : 
stack costs, online purchasing, promotion delivery, mobile retail, application performance management, business analytics, business intelligence, customer experience management
    
IBM
Published By: IBM MaaS360     Published Date: Jul 01, 2016
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise?
Tags : 
ibm, mobile, android, enterprise, wireless, enterprise applications
    
IBM MaaS360
Published By: IBM     Published Date: Apr 01, 2016
Keep your workforce and systems current for faster DevOps, deployment, and management of cloud, analytics and mobile applications. Learn about updated, intuitive mainframe tools that are easy-to-to use for both millennials and baby-boomers.
Tags : 
ibm, agile, agile development, cloud, mobile, z systems, mobile computing, cloud computing
    
IBM
Published By: IBM     Published Date: Apr 27, 2016
Adopting new mobile applications usually brings with it legitmate concerns related to security and risk mitigation. This technical white paper explains how IBM MobileFirst Platform can address some of the unique security challenges of mobile applications by helping you to: - Protect on-device data through encryption, offline authentication and other security features - Integrate IBM MobileFirst Platform with your existing enterprise security infrastructure - Prevent the mass distribution of tampered copies of your original application - Enforce security updates to your mobile applications
Tags : 
ibm, ibm mobilefirst, mobile, mobile application, app, mobile application security, mobile computing, mobile data systems, mobile workers, smart phones, wireless application software, wireless phones
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.