Whitepapers

HP ISS Technology Update Volume 9, Number 5

Understanding UEFI

UEFI (Unified Enhanced Firmware Interface) is a specification that defines a new interface and architecture for the system firmware that initializes server hardware subsystems before starting the OS boot process. It is now touted as a long-term successor to the BIOS system, which has been part of the x86 system architecture since its inception. Keep reading to understand more about its strengths and challenges.

Origins of UEFI

UEFI began as EFI, or the Enhanced Firmware Interface, and it was first proposed for the development of the Intel Itanium-based systems in the late 1990s. Because the Itanium architecture was essentially starting from scratch, there wasn’t much downside to defining a new firmware architecture for it. UEFI has grown out of a desire to extend this new firmware architecture to x86-based systems.

Xerox® ConnectKey™ Remote Control Panel White Paper

Section 1 – General Overview

Xerox® ConnectKey™ technology provides an environment for operating and managing Xerox® multifunction printers (MFPs). A Web-enabled Remote Control Panel feature is available on all Xerox® ConnectKey Controller-based products and may be accessed as a client from any IP connected workstation.

Remote Control Panel enables a user to view and operate the MFP user interface (UI) via a Web UI without being present at the physical device. This capability has a variety of applications and benefits throughout a product’s selling cycle and use. It can be used to demonstrate the product to prospective customers, to facilitate customer training and to provide real-time customer support.

Remote Control Panel also significantly enhances the management and servicing of ConnectKey MFPs. The user roles for this feature are defined as General User, System Administrator (SA), and the Authorized Service  Representative or Customer Service Engineer (CSE), each having their appropriate levels of access and control.

The Web UI provides a remote emulation of the device control panel in which both the hard and soft buttons are displayed and functionally operable on the client’s workstation. All user and administrator functions on the device can be accessed and operated remotely.

For More Efficient Documents Don't Forget to Sweat the Small Stuff

With document production consuming 3% of revenue and office machines consuming 15% of energy, what seems like a minor aspect of business operations can play havoc with both budgets and environmental targets. The good news is that with a little attention to detail, both cost and carbon emissions can be drastically reduced. Read on for tips that can improve energy efficiency, reduce waste of resources and cut costs – all without any reduction in productivity.

Efficiency begins at home

The high profile energy-hungry systems such as datacentres have already come under scrutiny, and a range of options presented ranging from virtualisation to offshoring, but some of the easy wins could be much closer to home. Gartner estimates that on average organisations spend 3% of their revenue on document production, and The Carbon Trust calculates that 15% of commercial energy is consumed by business machines. So it logically follows that optimising an organisation’s printing and copying fleet can help reduce both energy costs and carbon emissions. Yet many organisations pay little attention to the potential gains to be made here when considering their sustainability strategy. For most organisations, consideration of the environmental impact of printing is confined to email footers asking staff to consider whether printing is really necessary, and the liberal distribution of recycling bins around the office. The more enlightened install devices capable of printing double-sided, and use this as the default setting. It may be argued that this is better than nothing, but research indicates that the effectiveness of such steps is limited, and could even be counter-productive. Recent research by KYOCERA Document Solutions discovered a significant backlash against “print green” messages, with 58% of people responding negatively to such entreaties, branding them “ineffective” at best, and “pointless and patronising” at worst.

Kyocera Printers & Multi-Functional Devices in Citrix MetaFrame Environments

Testing performed by Kyocera

Kyocera (KTD1) performs Windows 2000 Terminal Server/MetaFrame XP Presentation Server testing on all Drivers.

Kyocera selected three (3) printing devices for Citrix testing reflecting the current product line. These three devices are representative of all Kyocera devices, using the same base code common to Kyocera Products. All data derived from these three devices is indicative of all Kyocera models. As a result of tests performed, all Kyocera Printers and Multifunctional Devices and print drivers listed in the matrix of this document are supported in Citrix MetaFrame environments.

Initially devices and drivers were tested during a functional testing phase. All applicable category actions were passed during this initial phase. For the actual testing phases a variety of documents were printed from various applications. Inside each application, files of different sizes were output. The file sizes were classified as small, medium and large. Classification was based on page number, not actual file size.

All clients in the test (40) ran the applications and printing concurrently to simulate a large MetaFrame environment.

HP PageWide Technology Breakthrough Speed, Professional Quality

Breakthrough speed, professional quality

Using breakthrough HP PageWide Technology, HP Officejet Pro X Series desktop printers and MFPs deliver up to twice the speed at up to half the printing cost compared with color laser printers.

This new class of devices offer the best of both ink and toner technologies, including:

  • Fast printing speed, up to 70 pages per minute in General Office quality mode
  • Powerful savings—up to 50% lower cost per page than color laser printers
  • No-compromise print quality, reliability, and energy savings
  • Compatibility with corporate enterprise networks for management and workflow solutions3

Original HP pigment inks deliver superb output quality and resist smearing on ba broad range of papers. Plus, offices can save money through low acquisition and operating costs, and help save additional money and resources with an ENERGY STAR®qualified device.

6 Dimensions of Capture Enabled BPM

Executive Summary

Capture Enabled BPM™—the combination of Capture and BPM technologies to automate information-intensive business processes across the enterprise—is transforming the way companies do business. Automatically capturing information at the back office for document archival, at the front office for feeding a business process, or at the Point of Origination™ for accelerating a transaction, helps organizations reduce costs and errors, improve efficiencies and customer response times and ensure compliance. Automating the business processes that use captured information—whether they consist of simple workflow routing, more complex but predictable processes, or highly dynamic processes that change with business needs—provides similar benefits: faster and less costly processing, better information quality and visibility, and improved collaboration and productivity. With these benefits, organizations are now able to provide a higher level of customer service for more competitive advantage and business growth than ever before.

The automation possibilities are limited only by the variety of documents and business processes an organization employs regardless of whether Capture Enabled BPM is used in:

  • An HR department to process and store employee onboarding documents
  • A Legal department to better automate fraud investigations
  • An AP department to extract data from invoices, get them approved, and better control late payment penalties and early payment discounts
  • Branch offices to capture and store new account applications
  • Customers to capture personal documents from their mobile devicesthat are required by the loan origination or insurance claims process

Kofax Capture Enterprise Implementation Considerations

Introduction

Optimized for enterprise-wide usage, Kofax Capture is a modular application. Right out of the box it can support the needs of a small or medium sized business or a single department, or it can expand to meet the needs of a high-volume enterprise.

Kofax Capture's flexible design makes it easy to incorporate customizations that perform highly specialized tasks to accommodate unique enterprise requirements.

The Kofax Capture platform offers exceptional compatibility with scanners and other caputre devices, content and document management systems, workflow applications, and databases. No matter what hardware or enterprise applications are implemented, Kofax Capture ensures consistent capture, indexing, and validation of the information needed by an enterprise.

As the capture industry leader, Kofax has the experience and expertise to address the neesds of any size enterprise. To do so, Kofax adheres to the following precepts:

Leverage Industry Standards to Include:

  • High availabilty
  • Standard platforms and communication protocols
  • Minimal operator training

Offer cusomtization enhancements such as:

  • Sample custom modules
  • Fully commented and self-documented sourch code examples
  • Extensive API libraries

Provide business process flexibility

Optimize capture and data extraction

Enabling Apple® AirPrint™ with Your Xerox® ConnectKey™ Device

Background

Apple AirPrint™ is a printing technology introduced with iOS® version 4.2 in November of 2010. It enables Apple iOS devices including the iPhone®, iPad®, iPod® Touch, and even Mac® OS X® to print without installing additional drivers or software. AirPrint uses well-established, familiar technologies already in use today including Bonjour, IPP, PDF and JPEG. 

Xerox is now certified and implementing AirPrint in the latest Xerox® ConnectKey™ WorkCentre® and ColorQube® devices. However, when these devices first launched, they were not AirPrint enabled. This document will instruct you on the basics of how AirPrint works and how to enable it onyour ConnectKey device. 

AirPrint is a relatively new technology designed to offer users the speed and convenience of direct print capability from their iOS-based wireless devices without cloud services or proxy devices in the print path. AirPrint will likely continue to evolve over the next few years as new features and functionality are added. Still, the basic operation of AirPrint will remain constant and will require knowing a few steps to ensure that it works easily across a variety of wireless devices as it was designed to do. AirPrint works best in flat Wi-Fi  networks, which are typically found in home and small offices. 

To ensure that your infrastructure is ready for AirPrint, let’s first take a look at the basic operation of the system.

Addressing Data Security Challenges in the Cloud

I. INTRODUCTION

Enterprises increasingly recognize cloud computing’s compelling economic and operational benefits. Virtualizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and accelerates deployment of new applications. However, those valuable business benefits cannot be unlocked without addressing new data security challenges posed by cloud computing.

Deploying confidential information and critical IT resources in the cloud raises concerns about vulnerability to attack, especially because of the anonymous, multi-tenant nature of cloud computing. Applications and storage volumes often reside next to potentially hostile virtual environments, leaving information at risk to theft, unauthorized exposure or malicious manipulation. Moreover, it’s possible for remnant data to persist when consumers vacate cloud volumes but vendors do not recycle storage devices securely. Governmental regulation of data privacy and location presents the additional concern of significant legal and financial consequences if data confidentiality is breached, or if cloud providers inadvertently move regulated data across national borders.

As a global leader in content security, Trend Micro has pioneered SecureCloud – a next-generation advancement that enables enterprises and other organizations to operate safely and securely in the cloud. SecureCloud represents a patented security infrastructure specifically engineered to control the security and privacy of data deployed to any cloud computing environment.

Big Security for Big Data

Big security for big data

We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data. It is because information is so pervasive that businesses want to capture this data and analyze it for intelligence.

Data explosion

The multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations need a way to protect, utilize, and gain real-time insight from “big data.” This intelligence is not only valuable to businesses and consumers, but also to hackers. Robust information marketplaces have arisen for hackers to sell credit card information, account usernames, passwords, national secrets (WikiLeaks), as well as intellectual property. How does anyone keep secrets anymore? How does anyone keep secrets protected from hackers?

In the past when the network infrastructure was straightforward and perimeters used to exist, controlling access to data was much simpler. If your secrets rested within the company network, all you had to do to keep the data safe was to make sure you had a strong firewall in place. However, as data became available through the Internet, mobile devices, and the cloud having a firewall was not enough. Companies tried to solve each security problem in a piecemeal manner, tacking on more security devices like patching a hole in the wall. But, because these products did not interoperate, you could not coordinate a defense against hackers.

Pages