Wireless Computing Systems Hardware White Papers

(View All Report Types)
Video Surveillance Economics: The New Picture of Quality and Economy
sponsored by Motorola Solutions
WHITE PAPER: As the world becomes increasingly security conscious, municipalities, institutions and enterprises of all sizes are discovering that there's safety in sight. Real-time video surveillance systems are proving to be one of the most effective methods of addressing a wide range of security challenges in both the public and the private sectors.
Posted: 21 Aug 2009 | Published: 21 Aug 2009

Motorola Solutions

Plantronics Savi 700 Series: Product Guide
sponsored by Insight and Plantronics
WHITE PAPER: This white paper details a wireless headset that allows you to manage your PC, mobile and desk phone all at once.
Posted: 14 Nov 2013 | Published: 16 Nov 2011

Insight and Plantronics

Linear Architecture for Municipal Wireless Video Surveillance Solutions
sponsored by Motorola Solutions
WHITE PAPER: Motorola knows how to build systems that meet the needs of Public Safety professionals now and over the lifetime of the network. No one technology meets the needs of all applications. With a portfolio of specialized solutions, CIOs and network operators can deploy the network that is the best fit to locate the cameras exactly where they are needed.
Posted: 21 Aug 2009 | Published: 20 Aug 2009

Motorola Solutions

School Bus Tracking Market Brief
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how mobile resource management (MRM) solutions can give administrators greater visibility into the location of assets and help organizations create a safer, more cost-effective transportation system.
Posted: 13 Oct 2011 | Published: 13 Oct 2011

AT&T Corp

Plantronics Wireless Density: Whitepaper
sponsored by Insight and Plantronics
WHITE PAPER: This white paper breaks down the four considerations that must be dealt with when installing wireless headsets.
Posted: 12 Nov 2013 | Published: 12 Nov 2009

Insight and Plantronics

More advanced business-class management, security, and reliability than Lenovo. Do more with Dell Latitude.
sponsored by DellEMC and Intel®
WHITE PAPER: This whitepaper offers a checklist for laptops that compares two leading offerings with regards to manageability, durability, and “securability.”
Posted: 14 Mar 2014 | Published: 14 Mar 2014

DellEMC and Intel®

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Future Proofing Your Mobile Computers: How the Features You Select Now Can Protect & Extend Your Investment Years into the Future
sponsored by Intermec
WHITE PAPER: This white paper explains how the features and options available for ruggedized mobile computers used in warehousing and distribution can extend the time they can perform in warehouses and distribution centers. It also provides guidance on how to make decisions that will protect your investments by meeting user needs today and into the future.
Posted: 12 May 2011 | Published: 12 May 2011

Intermec

Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management
sponsored by TechTarget Security
WHITE PAPER: The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

TechTarget Security