IT Management  >   Systems Operations  >  

Hardware Management

RSS Feed    Add to Google    Add to My Yahoo!
Hardware ManagementMultimedia (View All Report Types)
6 Matches
Workstation Advisor Tool
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
Posted: 10 Apr 2014 | Premiered: 10 Apr 2014

Dell, Inc.

M3800 vs Macbook Pro
sponsored by Dell, Inc.
VIDEO: This quick video pits the Dell Precision M3800 against the Apple MacBook pro, comparing the features such as boot times, screen resolution, video rendering speeds, interface capabilities, and more.
Posted: 09 Apr 2014 | Premiered: 19 Dec 2013

Dell, Inc.

Intel & Dell TCO Client Business calculator
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: Developed from industry research and insights from Intel IT, the Business Client Refresh ROI Estimator lets you explore the business value of replacing your aging PCs with new IntelĀ® processor-based devices. Click to access it now.
Posted: 08 Apr 2014 | Premiered: 08 Apr 2014

Dell, Inc.

VA vs. Watts; Demystifying Sizing and Ratings
sponsored by Eaton Corporation
WEBCAST: This brief on-demand webcast describes the difference between volt-amperes (VA) and watts, and explains how differentiating between the two is critical in helping you correctly size your UPS.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton Corporation

Client Virtualization with XenClient: A Podcast with Brian Madden
sponsored by Citrix
PODCAST: In this episode of Brian & Gabe Live, Brian Madden and Gabe Knuth talk with Dan Cote and Pete Downing of Citrix about the latest developments with XenClient.
Posted: 08 Oct 2013 | Premiered: Sep 25, 2013

Citrix

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
6 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement