PDA

Personal Digital Assistants(PDAs) are handheld devices that were originally designed as personal organisers, but became much more versatile over the years. The many uses and tasks of a basic PDA include many features: calculating, use as a clock and calendar, playing computer games, accessing the Internet, sending and receiving E-mails, use as a radio or stereo, video recording, recording notes, use as an address book, and use as a spreadsheet.
Results 1 - 25 of 103Sort Results By: Published Date | Title | Company Name
By: Panasonic     Published Date: Feb 19, 2015
Does any mobile device offer everything we need? Panasonic has a device that combines the best benefits of all devices.
Tags : mobile devices, mobility, technology, panasonic, new panasonic devices, toughpad devices, benefits of different devices, electronics
     Panasonic
By: Panasonic     Published Date: Feb 19, 2015
This video provides an introduction to the Panasonic Toughpad FZ-E1 tablet and how it can benefit your workforce.
Tags : panasonic, toughpad devices, new panasonic devices, mobility technology, tablet, toughpad fz-e1, toughpad fz-x1, mobile
     Panasonic
By: Panasonic     Published Date: Feb 19, 2015
This video shows how Panasonic's new Toughpad device survives the most challenging tests.
Tags : toughpad device, panasonic toughpad device, toughpad fz-e1, toughpad fz-x1, testing toughpad device, tablet, panasonic, mobility
     Panasonic
By: Panasonic     Published Date: Feb 18, 2015
This factsheet provides all of the important details of the Panasonic Toughpad FZ-E1.
Tags : tablet, field technology, panasonic, mobility technology, electronics, mobile computing, mobile data systems, mobile workers
     Panasonic
By: Citrix     Published Date: Mar 11, 2014
Empowering people to use Windows applications and native mobile apps on any type of device—with full security
Tags : citrix, xenapp, mobile applications, enterprise applications, windows applications, windows, mobile device, remote access
     Citrix
By: RingCentral     Published Date: Dec 05, 2013
Employees today want to be able to choose their own mobile devices based on their preferred design and functionality, a trend known as “bring your own device,” or BYOD. This can be a boon to the organization, but it is also a risk. This study explains why.
Tags : ringcentral, mobile devices, mobile workers, cellphone, bluetooth, wireless, cell phone, iphone
     RingCentral
By: Toshiba     Published Date: Oct 01, 2013
Workers still see value in laptops for running most critical apps, IDC survey says. Click here to find out why.
Tags : toshiba, laptop, mac, computers, mobile workers, remote workers, international workers, printers
     Toshiba
By: Neverfail Group     Published Date: Feb 10, 2012
In today's competitive and budget-sensitive world, any solution that does not provide uninterrupted availability proves an unfit guardian of an organization's most important applications.
Tags : database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
     Neverfail Group
By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication
     Cisco
By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention, access control
     PC Mall
By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
     PC Mall
By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : mobile phone security, mobile security, mobile device security, mobile device management, malware, mobile antivirus, data encryption, ibm
     PC Mall
By: Cotendo     Published Date: Nov 18, 2011
Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.
Tags : mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance, mobile cdn, mobile cloud, mobile application performance
     Cotendo
By: HP     Published Date: Nov 14, 2011
Read this whitepaper to learn the 3 key factors that IT managers need to consider when designing a scalable network for today's mobile workforce.
Tags : networks, mobile, mobile workers, worforce, scalable, wi-fi, text, social networks
     HP
By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
     AT&T
By: AT&T     Published Date: Nov 07, 2011
Contact center hosting and cloud-based solutions are fast becoming integral to enabling customer care service for enterprises.
Tags : contact center services, contact center, trends in contact centers, services, solutions, customers, enterprises, at&t
     AT&T
By: Aerohive     Published Date: Oct 12, 2011
Once you've enabled your people to work wirelessly from anywhere, anytime, on any device, you need to maintain security and control under constant pressure to drive down cost, while increasing productivity and growth. Enter the Cloud.
Tags : aerohive, wireless network management, cloud-based networking, cloud-enabled applications, cloud services, wi-fi management, mobile computing, mobile data systems
     Aerohive
By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing
     Aerohive
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn where you need to invest your mobile money.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless
     Dell Mobility
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless
     Dell Mobility
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn which mobile initiatives IT organizations are investing in most aggressively and what's driving those decisions.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless
     Dell Mobility
By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless
     Dell Mobility
By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
     Adobe
By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure
     Entrust Datacard
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.