Hardware  >   Peripheral Hardware  >   Computer Monitors  >   Computer Displays  >   Flat Panel Computer Displays  >  

Active Matrix Displays

RSS Feed    Add to Google    Add to My Yahoo!
Active Matrix DisplaysWhite Papers (View All Report Types)
 
Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Roadmap to an Omni-Channel-Aware POS Update
sponsored by Toshiba
WHITE PAPER: Today's multi-channel retail environment demands tools that will help support customer interactions across a variety of platforms. This comprehensive e-book provides an in-depth look at the three essential components of converting to an omni-channel aware POS.
Posted: 12 May 2014 | Published: 12 May 2014

Toshiba

Success On An International Scale: What An ERP System Can Offer
sponsored by Sage Software
WHITE PAPER: Discover guidelines for mid-sized organizations looking to expand internationally, and find out why a solid ERP system is critical to success.
Posted: 30 May 2014 | Published: 30 Sep 2013

Sage Software

Five Easy Steps to Smarter Systems Imaging
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper takes you through 5 steps for developing a smarter approach to systems imaging that layers a unique set of drivers, updates, applications, configurations and user personality on top of the core configuration images.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Dell and Microsoft

Quickly access patient data with enhanced security
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper gives an overview of the HP mt40, a thin client tailored for business-needs and promises high reliability, low ownership costs, PC-like performance, faster processing power, and flexible battery options. Read on to learn more about the HP mt40, including features, specifications, support services and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Hewlett-Packard Company

DVS Enterprise - Active System 800v with VMware Horizon View 5.2: Reference Architecture
sponsored by Dell and VMware
WHITE PAPER: This exclusive paper examines a converged infrastructure solution that's designed specifically for desktop virtualization – and that is pre-configured to meet your organization's specific requirements and ready to integrate into your data center.
Posted: 13 Jun 2013 | Published: 13 Jun 2013

Dell and VMware

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Running SAP NetWeaver on the Oracle Exalogic Elastic Cloud: An Architectural Overview
sponsored by Oracle Corporation
WHITE PAPER: This white paper underscores the importance of a cohesive SAP infrastructure. Explore a recommended architecture and the process involved in implementing it.
Posted: 02 Aug 2012 | Published: 01 Sep 2011

Oracle Corporation

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute Software
WHITE PAPER: Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement