Searching all of TechTarget| 44,063 results for "devices"

Conversations: Biometric devices

See all conversation search results provided by ITKE.


By Matthew David Evaluate Oct 29, 2015

How to choose a device when investing in emerging markets

As companies plan to invest in emerging markets, their choice of device for launching apps will be critical. Matthew David explains what to keep in mind. Continue Reading


By Mike O. Villegas Manage Oct 27, 2015

How to strengthen bring your own device security

Bring your own device security requires comprehensive management, including policies, compliance and MDM. Here's what to cover to mitigate BYOD security issues. Continue Reading


By Shaun Sutner Get Started Sep 14, 2015

Medical device integration strategies explained

Medical devices should be connected, CEO of Cardiopulmonary Corp., developer of Bernoulli medical device integration (MDI) system, said in a Q&A. Continue Reading


News Sep 09, 2015

The good and bad of supporting Apple devices

As more consumers bring Apple products into the workplace, IT needs to manage and support users' smartphones and tablets, along with the iOS operating system. To further complicate matters, Apple constantly ... Continue Reading


By Jessica Scarpati Manage Sep 01, 2015

Supporting wireless infrastructure as devices proliferate

In this Q&A, one IT pro shares the challenges of supporting wireless infrastructure in student housing, where residents have more devices than ever. Continue Reading


By Alex Scroxton Nov 04, 2015

1248 trials IoT device management platform

Internet of things (IoT) specialist 1248 plans to unveil a service to help businesses manage and maximise value from their IoT deployments Continue Reading


By Michael Cobb Manage Oct 22, 2015

What's the key to IoT device discovery in the enterprise?

Internet of Things devices are propagating within the enterprise. Expert Michael Cobb explains how an IoT device discovery process can help thwart security risks. Continue Reading


By Eddie Lockhart Get Started Oct 13, 2015


By Cliff Saran Jul 29, 2015


Evaluate Oct 05, 2015

Hacking and Penetration Testing with Low Power Devices

In this excerpt of Hacking and Penetration Testing with Low Power Devices, author Philip Polstra describes "The Deck" -- a custom Linux distribution -- that breaks the traditional penetration model by providing pen... Continue Reading