device

Results 1 - 25 of 2760Sort Results By: Published Date | Title | Company Name
Published By: Xerox     Published Date: Jun 11, 2015
Top 5 areas to consider when assessing and choosing a new Multifunction Device (MFD) in the Public Sector Inside you’ll find a few points to consider, including… 1. Clearly define your requirements 2. Total cost of ownership 3. Added value features and functionality 4. Ease of use 5. Device service & support Download the whitepaper to find out more.
Tags : 
    
Xerox
Published By: Xerox     Published Date: Jun 11, 2015
Procuring multi-function devices via the RM1599 framework. Delivering savings. Reducing risk. Saving you time.
Tags : 
    
Xerox
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: Cisco     Published Date: Sep 23, 2014
With the ever increasing capability of mobile devices, together with continual increase in wireless throughput (one Gbps wireless LAN throughput is a reality today); there’s a clear need for a comprehensive and robust wireless deployment strategy in all public and private sector organisations.
Tags : 
    
Cisco
Published By: Lenovo     Published Date: Dec 17, 2019
We’re only as good as the tools we use. So, if you’re using Windows 7 on an aging machine, your toolbox is already well out of date. And from 14 January 2020, Windows 7 PCs will no longer receive Windows support. That means no more updates, and no more security patches. Luckily, there are some compelling reasons to modernise your PC fleet with Lenovo devices, powered by Windows 10 Pro, Office 365 and the Intel® vPro™ platform. - More Performance - More Security - More Productivity - More Connectivity - More Efficiency - More Mobility & Durability - More Savings
Tags : 
    
Lenovo
Published By: Akamai Technologies     Published Date: Dec 18, 2019
"A Zero Trust model ensures that security and access decisions are dynamically enforced based on identity, device, and user context. This security framework dictates that only authenticated and authorized users and devices can access applications and data, while also protecting workloads and users from advanced threats. Read this white paper to learn how to progress your Zero Trust transformation, safeguarding users, applications — and the future of your business — with best practices including: • Isolating your network infrastructure from the public Internet • Enabling WAF to protect corporate applications • Monitoring Internet-bound traffic and activity"
Tags : 
    
Akamai Technologies
Published By: Schneider Electric     Published Date: Jan 09, 2020
The utility industry is under pressure to improve substation automation cyber security. Manufacturers of substation products use proprietary or product-specific methodologies for managing device security. As a result, standardization and ease of management of these devices is lacking. This paper reviews processes and procedures for securing a substation, offers advice for overcoming substation asset management challenges, and describes some of the tools available.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 09, 2020
Arc faults in low voltage electrical installations within buildings pose significant safety risks. Electric arcs in conductors and connections are not detected by existing protective devices such as circuit-breakers or residual current devices (RCDs), even though these arcs cause fires. To minimize the threat of electrical installation-related fires, electricians, contractors and building occupants need to consider deploying new Arc Fault Detection Devices (AFDD). This paper discusses new break-through in the field of electrical protection, and identifies critical application areas where AFDDs enhance safety
Tags : 
    
Schneider Electric
Published By: UL     Published Date: Dec 04, 2019
From its first documented use nearly 30 years ago, robotics today is playing a major role in efforts to bring innovative patient treatments to the healthcare industry. Robotically assisted equipment and systems are now being widely used in advanced surgical procedures, helping to reduce complications and improve overall surgical outcomes. The International Electrotechnical Commission (IEC) has now published a standard to address the specific performance and safety characteristics of robotically assisted equipment. The standard, IEC 80601-2-77, Medical Electrical Equipment – Particular requirements for the basic safety and essential performance of robotically assisted surgical equipment, bridges an important gap in previously available medical device standards. Reflecting more than a decade of work by industry experts from around the world, IEC 80601-2-77 is expected to be adopted in the near future by regulatory authorities in most international medical markets for use in assessing the
Tags : 
    
UL
Published By: UL     Published Date: Dec 04, 2019
Risk of electromagnetic interference and immunity have long been important in the evaluation of the safety of medical devices by regulatory authorities. But the expanded scope of environments in which medical devices are being used today, along with the growing prevalence of all types of medical and non-medical systems and devices utilizing wireless communications technologies, new challenges have been created for medical devices and increased potential risks to patients.
Tags : 
    
UL
Published By: UL     Published Date: Dec 04, 2019
Information on electrical safety, regulatory requirements and Electromagnetic Compatibility (EMC) Hosted by EMC expert, Bob DeLisi, the webinar will provide healthcare providers and manufacturers with expert information regarding electrical safety, compliance and EMC healthcare and medical devices. Topic covered will include: General changes to IEC 60601-1-2 Emissions testing Immunity testing Reporting
Tags : 
    
UL
Published By: UL     Published Date: Dec 04, 2019
Information on electrical safety and regulatory requirements for laboratory equipment Hosted by Walter Hofmair, Principal Engineer at UL Munich, the webinar will provide healthcare providers and manufacturers with expert information regarding electrical safety and compliance for healthcare and medical device laboratory equipment. Topic covered will include: Overview of IEC 61010 particulars and specific requirements Changes in the new IEC 61010-3.1 IEC 61010 compliance
Tags : 
    
UL
Published By: Algolia     Published Date: Jan 08, 2020
Despite the success of e-commerce, consumers’ overall experiences with e-commerce have been less than natural. The modern day keyboard was designed to force users to type slower. Swiping is a learned behavior limited to mobile devices. Users are trained to search the Internet by focusing on the right keywords. And let’s face it, no one really enjoys wearing an awkward headset that covers their eyes for more than a couple of minutes. Delivering the right experience, at the right time, through the right device is critical. The next revolution in e-commerce will be powered by the most natural form of human interaction: voice. This eBook is designed to help plan for and capitalize on voice search as it prepares to enter mainstream adoption.
Tags : 
    
Algolia
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Not all cloud security solutions are created equal. You’ll want to look for a solution that meets the needs of today’s mobile, cloud-connected workforce, and is easy to manage on a day-to-day basis. Find out why security built into the foundation of the internet is better able to provide visibility into internet activity across all locations, users and devices, on and off-network.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. No wonder it’s gaining traction
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
With 40+ separate premises plus a growing number of remote workers and devices, Norfolk and Suffolk NHS Foundation Trust needed to ensure consistent levels of end-user security across all locations. As a mental health trust, this particularly sensitive environment required maximum levels of confidentiality throughout, with threats identified quickly and dealt with effectively.
Tags : 
    
Cisco Umbrella EMEA
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
In 2020, some 30.7 billion IoT devices are expected to be active in the world. An estimated 40% of IoT devices will be used in healthcare.1 Yet connected health represents only 30.3% of connected devices, according to Intel.®2 What accounts for the difference? Unlike other industries leading the adoption of IoT, such as manufacturing, retailing, and AE&C (architecture, engineering, and construction), healthcare systems and hospitals embrace two categories of connected devices: IoT (Internet of Things) and IoMT (Internet of Medical Things).
Tags : 
    
Lenovo - StudioNorth
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
Computing devices are rising to the challenge. They are more flexible and offer increasingly expanding functionality. That’s good news — CIOs can be assured that the newest devices can handle the demands of technologies such as VDI (virtual desktop infrastructure), AR/VR, and high-resolution imaging. However, new devices must also meet increasing regulatory compliance and requirements for secure, hack-resistant patient data access.
Tags : 
    
Lenovo - StudioNorth
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Digital Realty     Published Date: Jan 15, 2020
Gaming-as-a-service (GaaS) has a new frontier: cloud gaming. According to a report released by Statista, the cloud gaming market is expected to grow to $450M by 2023.1 Between Microsoft’s xCloud, Apple Arcade, Google Stadia and Amazon’s Twitch, cloud gaming is poised to grow at unprecedented rates. The race to perfect the 5G gaming experience on smart devices has prompted tech giants to invest in next-gen connectivity and cloud-based solutions. The gaming as a service market has experienced a shift from traditional consoles to cloud-based streaming via data centers. Augmented reality (AR), virtual reality (VR) and multiplayer gaming has transformed the user experience and presented new revenue streams for game developers. With 2.4 billion gamers worldwide,2 the market opportunity in the gaming industry is massive. Consumer expectations have changed, and new technologies such as 5G, edge computing and the cloud have unearthed new challenges around user data, connectivity and cost. Thi
Tags : 
    
Digital Realty
Published By: Flexential     Published Date: Jan 21, 2020
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question. As it turns out, there is more than one edge. There is certainly the far edge that reaches all the way to end users, mobile devices and remote sensors. But there is also a strong case for a near edge – an intermediate location that is closer than the cloud but doesn’t reach the granularity of individual IoT devices. The edge is increasingly important because compute resources have become widely distributed. In the case of the public cloud, those resources can be in indeterminate f
Tags : 
    
Flexential
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.