Hardware  >   Peripheral Hardware  >   Computer Monitors  >  

Computer Screens

RSS Feed    Add to Google    Add to My Yahoo!
Computer Screens White Papers (View All Report Types)
 
MMD study: Increase health of deskworkers with the right IT equipment
sponsored by MMD
WHITE PAPER: The following white paper explores the benefits of how pairing your workforce with an ergonomic monitor can alleviate a large portion of pain and fatigue, ultimately increasing their well-being, happiness, and efficiency. Read on to learn more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

MMD

Cisco UCS C240 M3 with NVIDIA GRID Cards for VMware Horizon View 5.3
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper is to provides specific guidelines and methods to integrate Cisco UCS C240 M3 rack servers with NVIDIA GRID K1 and/or K2 cards with VMware products so that the servers, the hypervisor and the desktop broker are ready for graphic application installation.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Cisco Systems, Inc.

Accelerate Graphics in Virtual Environments
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This whitepaper examines the top challenges associated with demanding graphics software and explains why virtualized graphics may be the answer organizations need when it comes to overcoming these challenges.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Dell, Inc. and Intel®

Failover Strategies on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses how Cisco's popular and powerful Unified Computing Solution is driven by the flexibility and agility of the hardware failover options and Service Profiles.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Deliver Windows Apps to Google Chromebooks for a Seamless, App-centric Experience From Anywhere
sponsored by Citrix
WHITE PAPER: This whitepaper explains how, through the use of desktop virtualization solutions, organizations can launch centrally hosted enterprise applications alongside Google Apps, SaaS and other cloud services within the same Chrome environment without the need to launch one or more virtual Windows desktops.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

Citrix

Busting Solid-State Storage Myths: Maximizing the Impact of Flash
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to bust common solid state storage myths, and find out exactly how some companies are using flash to reach their data storage goals.
Posted: 12 Mar 2015 | Published: 31 Jul 2014

Dell, Inc. and Intel®

Group-Based Policy for OpenStack
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces the new OpenStack Group-Based Policy (GBP) framework designed to offer a new set of API extensions to manage OpenStack infrastructure through declarative policy abstractions. Find out how GBP is based on four main concepts and explore a broad range of use cases.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

IaaS Wars. What it means for Technology Vendors?
sponsored by Vembu Technologies
WHITE PAPER: This resource explains how the demand for IaaS has affected technology vendors.
Posted: 03 Dec 2014 | Published: 18 Nov 2014

Vembu Technologies

Challenging The Status Quo On Maintenance Contracts And Refresh Cycles To Lower Costs
sponsored by Curvature
WHITE PAPER: In this informative report issued by Forrester, explore the results from their survey that was designed to explore how customers evaluate and select networking tech vendors, schedule equipment upgrades, and gauge awareness of third party networking solutions.
Posted: 17 Mar 2015 | Published: 01 Mar 2013

Curvature

Create brand evangelists with CNAM
sponsored by Flowroute
WHITE PAPER: Read this white paper now to discover how you can boost sales with something as easy as improving your caller ID presence.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

Flowroute

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by SearchSecurity.com
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

SearchSecurity.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

CW Special Report on IBM
sponsored by ComputerWeekly.com
IT BRIEFING: This special 12-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers, its place in the IT market and its future strategy..
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Securely Delivering Enterprise Information on Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 12 Aug 2012 | Published: 01 Jul 2014

Citrix

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Mobile Security Software Keeps Corporate Data Safe
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Case Study: Tesco's £65 million data centre strategy to drive online growth
sponsored by ComputerWeekly.com
CASE STUDY: This Computer Weekly case study, packed with photographs and data, gives the inside story of Tesco's £65 million data centre strategy.
Posted: 21 Nov 2012 | Published: 21 Nov 2012

ComputerWeekly.com

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

How MSPs Can Help SMBs Prevent Irreparable Data Loss
sponsored by N-able Technologies
WHITE PAPER: This resource answers a number of questions that MSPs may have regarding helping their customers to protect their critical data from loss, and also provides a list of items to look for when choosing a managed backup solution.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

N-able Technologies

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

How Social Learning Boosts Skills Development
sponsored by IBM
WHITE PAPER: In this white paper, discover how a social learning program can improve engagement, reduce attrition, and increase speed of knowledge. Explore the common problems that social learning can help solve, the core components of a social learning initiative, and recommended actions for implementation.
Posted: 04 Aug 2014 | Published: 31 Jul 2013

IBM

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Securing the Future of Trust on the Internet
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains why public key infrastructure (PKI) is the key to the future of trust on the Internet, and the steps that must be taken to build a stronger, more trustworthy PKI ecosystem.
Posted: 20 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Best practices for introducing tablets in your enterprise
sponsored by SearchSecurity.com
EGUIDE: There is a lot of hype around tablets, but many companies are still weighing their benefits. This expert e-guide explores the top reasons businesses should consider these devices and offers advice for keeping them secure once they have been implemented.
Posted: 20 May 2011 | Published: 20 May 2011

SearchSecurity.com

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement