remote computing

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
Published By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : 
cloud technology, service offerings, efficiency, managing networks, operational issues
    
Sage
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
The 8x8-CCNG survey shows more and more companies are moving their contact centers to the cloud, and for a range of reasons that is appealing to almost every business center. Most prominent among those objectives are better business continuity, scalability, supporting remote workers, and integrating new technologies like multi-channel capabilities. Does your contact center employ remote agents? More than half do or respondents do! Across industries, prioritizing top talent and supporting remote workers is a growing concern. Cloud contact centers support this objective by making the full set of technologies and features available to all users, wherever they are located. Download now to learn more.
Tags : 
8x8, cloud contact center, remote work, scalability, cloud computing
    
8x8 Inc.
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Intel     Published Date: Aug 10, 2012
Intel AMT configuration is the gateway to manageability enabling time and cost-saving capabilities to manage and secure our PCs across the enterprise.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise securirty, save time, save money, cloud computing, virtualization, security, storage, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Learn how Intel Core vPro with SCS8.0 can help make Setup easy with an array of features from scanning to applying patches right from IT desk.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
CoreT vProT processors helps IT deliver off-hour patching and repairs by remotely power cycle client PCs to enable a greener energy management.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT helps IT to deliver crimeware protection and unprecedented embedded security for your clients and business data
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
See why 3rd generation Intel® CoreT vProT processors are ideal for Windows 7 security in your demanding and fast moving business environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
What is Intel® CoreT vProT technology? Learn about the security and manageability features that deliver a secure and efficient IT environment.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, animation, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
An in-depth look at how McAfee Deep Defender and DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Intel® CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Find the Intel® desktop processor to meet your business needs with this interactive desktop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise securirty, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
Find the Intel® laptop processor to meet your business needs with this interactive laptop processor comparison tool
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management, business technology
    
Intel
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture, it management
    
Box
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: BlackBerry     Published Date: Apr 12, 2010
Incumbered by paper-based workorders and instructions relayed verbally, Cable TV company Videotron needed a solution that helped manage service requests in a way that cut costs, sets it apart from the competition, and showed market leadership.
Tags : 
blackberry, videotron, automation, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 20, 2009
Ricoh Americas Corporation (Ricoh) is a provider of document solutions, including digital imaging systems, fax machines, printers, scanners and data storage. Ricoh wanted a solution to automate service calls handled by field service technicians. They decided to create an application for the BlackBerry solution that would improve call efficiency and give technicians more control over the tasks performed during their day.
Tags : 
blackberry, ricoh, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 16, 2009
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Tags : 
blackberry, enterprise solution, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, Mike Kirkup tells about BlackBerry application platform which simplifies the development, deployment and management of wireless applications. Leverages the core strengths of the BlackBerry solution to mobilize additional business processes and applications.
Tags : 
blackberry, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The Blackberry Java Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java MET) applications for Java-based Blackberry smartphones.
Tags : 
blackberry, java, jde, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
n this webcast you will learn that Global Positioning System (GPS) is a series of 24 geosynchronous satellites that continually transmits position information.
Tags : 
blackberry, gps, tracking, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com