Skip to main content
 

ipod

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
The Wales Home selected the STANLEY Healthcare AeroScout Resident Safety solution because of its ability to protect residents throughout the building and grounds, with every resident carrying a personal pendant to call for help at any time. Alerts are automatically directed to staff via Apple iPod® mobile digital devices, and activity is captured in a database for analysis. The Wales Home is also leveraging the AeroScout platform for temperature monitoring of its server room and refrigeration units. Read this case study to learn more about how The Wales Home increases resident safety and autonomy with STANLEY Healthcare’s AeroScout® Solutions.
Tags : 
resident safety, healthcare, nurse call systems, wi-fi, mobile devices, temperature monitoring, information technology, practice management
    
STANLEY Healthcare
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Apple Corporation     Published Date: May 29, 2012
Please join us at this on-demand online seminar. It'll take about an hour and it's absolutely free.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards, search marketing
    
Apple Corporation
Published By: Apple     Published Date: Jan 23, 2012
Our Apple Business Experts are ready to help you find the perfect setup for your organization, from custom desktop and mobile solutions to hardware, software, and more.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards
    
Apple
Published By: Apple Corporation     Published Date: Jan 20, 2012
Our Apple Business Experts are ready to help you find the perfect setup for your organization, from custom desktop and mobile solutions to hardware, software, and more.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards
    
Apple Corporation
Published By: Apple Corporation     Published Date: Nov 19, 2012
Our Apple Business Experts are ready to help you find the perfect setup for your organization, from custom desktop and mobile solutions to hardware, software, and more.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards
    
Apple Corporation
Published By: Safe Software     Published Date: Mar 19, 2008
In this follow-up to their preholiday study of 12 of the season's most talked about products and retailers, Oneupweb looks at how these companies' online social media marketing strategies played out during the 2007 holidays. See what worked, why, and what social media marketing tactics you should be considering in 2008.
Tags : 
social, social media, one up web, oneupweb, survey, poll, ipod, wii, target, coach, webkinz, myspace, taryn, pronto, starbucks, pleo
    
Safe Software
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security
    
CopiaTECH
Published By: Pixxa     Published Date: Jul 07, 2011
With the Pixxa iPhone/iPod Touch app you are able to manage and monitor your Cloud Virtual Machines in the palm of your hand!
Tags : 
pixxa, iphone, ipod, app, control, virtual machine
    
Pixxa
Published By: Apple Corporation     Published Date: Dec 01, 2011
In this seminar, you'll learn how you can use the iPad to create and deliver stunning sales and marketing presentations, make business meetings even more productive and take advantage of business "dashboards" to stay better informed no matter where you're working from.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards
    
Apple Corporation
Search      

Add Research

Get your company's research in the hands of targeted business professionals.