Hardware  >   Networking Hardware  >   Network Peripheral Hardware  >   Network Appliances  >  

Internet PC

RSS Feed    Add to Google    Add to My Yahoo!
Internet PC White Papers (View All Report Types)
 
How IoT Can Drive Your Analytics Strategy
sponsored by Presidio Networked Solutions
WHITE PAPER: In this white paper, learn the basic steps to creating your own IoT focused analytics strategy.
Posted: 18 Jan 2017 | Published: 14 Nov 2016

Presidio Networked Solutions

The Hidden Costs of Delivering IIoT Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: Better understand the total cost of implementing industrial IoT (IIoT) services for your business and make smart, profitable and sustainable business decisions moving forward.
Posted: 29 Dec 2016 | Published: 30 Apr 2016

Cisco Systems, Inc.

The Hidden Costs of Delivering IoT Services
sponsored by Cisco Systems, Inc.
WHITE PAPER: Uncover the total costs associated with IoT services and develop a business case that goes beyond IoT service deployment to operational scalability and long-term business growth.
Posted: 28 Dec 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

IoT Strategy: 8 Key Questions to Ask
sponsored by Cisco Systems, Inc.
WHITE PAPER: IoT introduces tremendous risk if the connected products and services are not designed, deployed and supported properly. The 8 questions presented in this white paper provide a step-by-step approach for turning an IoT vision into reality.
Posted: 29 Dec 2016 | Published: 30 Nov 2016

Cisco Systems, Inc.

Proactive Service Assurance for Mobile Data Services
sponsored by InfoVista Corporation
WHITE PAPER: Until very recently, customer volume for data services was so low that service providers couldn't justify investment in robust, end-to-end service assurance solutions for mobile data services. Now, with the volume of data services on mobile networks growing, the business case for such an investment is clear. Read on to learn more.
Posted: 02 Mar 2009 | Published: 26 Feb 2009

InfoVista Corporation

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Capitalizing on The Internet of Things
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how transform a product business into a service business, the core benefits and challenges of IoT, as well as 5 fundamentals to consider when evaluating how your company can best leverage the internet of things.
Posted: 29 Dec 2016 | Published: 29 Dec 2016

Cisco Systems, Inc.

Cost, Speed, and Reliability Tradeoffs between N+1 UPS Configurations
sponsored by Schneider Electric
WHITE PAPER: This expert white paper discusses key tradeoffs between internal "modular" redundant UPS and parallel redundant UPSs as well as stresses the importance of fault tolerance within the UPS to ensure that availability, reliability and maintainability needs are met.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

Schneider Electric

Riverbed Hyper-converged Edge
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Take a look at the architecture of traditional HCIs and how organizations are turning to stateless, rather than stateful, hyper-converged architectures to overcome common remote office dilemmas.
Posted: 17 Dec 2015 | Published: 17 Dec 2015

Riverbed Technology, Inc.

BYOPC Strategy: Policies and Problem Solving
sponsored by SearchSecurity.com
EGUIDE: Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

SearchSecurity.com

Computer Weekly Special Report: Fujitsu
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page special report updated for 2014 gives you the facts on  Fujitsu its strategy, products and services and financial performance.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Endpoint Management - IT handbook
sponsored by SearchDataCenter.com
EBOOK: Access this expert IT handbook for an in-depth look at the at endpoint management techniques and technologies that your organization should consider.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

SearchDataCenter.com

There's an App Store for That: Stock Your Mobile Workers with the Right Resources
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will discover how to develop, provision, and manage mobile apps through an individualized enterprise app store built on a secure portal. Access this e-zine now to learn how deploying your own app store cuts down on the problems that arise with public stores.
Posted: 08 May 2015 | Published: 08 May 2015

SearchMobileComputing

VDI—Simplify Your Migration to Windows 10 and Embrace Desktop Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover how to streamline your migration to Windows 10 with a virtualized infrastructure that simplifies BYOD, app compatibility, and corporate desktop management. Access this paper now to answer your burning questions about this OS and how it pertains to desktop virtualization.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

Citrix

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

E-Guide: Windows 10 Improvements Help the OS Meet Enterprise Needs
sponsored by vmware airwatch
EGUIDE: In this expert e-guide, you will learn why W10 could be the new de facto OS for the enterprise. Access this exclusive guide to key into some of W10's best qualities and determine if these features will ease your enterprise desktop management.
Posted: 11 Dec 2015 | Published: 11 Dec 2015

vmware airwatch

Ten Areas Where Citrix XenApp Outperforms VMware Horizon
sponsored by Citrix
WHITE PAPER: The following white paper examines a virtualization platform that can enable virtually any Windows application to be virtualized, centralized, and managed in the data center, and can instantly deliver it as a service to users anywhere on any device.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Citrix

Computer Weekly: Leadership bonus – analysing our UK salary survey
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.
Posted: 07 Oct 2016 | Published: 11 Oct 2016

ComputerWeekly.com

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses
sponsored by SearchDataCenter.com
EBOOK: Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

SearchDataCenter.com

E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

VMworld Europe Case Study:  Colt Technology
sponsored by ComputerWeekly.com
CASE STUDY: Managed service provider Colt designed and rolled out a scalable, cloud-hosted desktop virtualisation project that is reaping benefits for local councils.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

Infographic: Five Bold Ways Hybrid-Mode Will Change Your World
sponsored by VMware
RESOURCE: Access this infographic to change how you think about desktop transformation with a brand new approach that uses cloud-based management, intelligent orchestration, and hyper-converged infrastructure to deliver and manage desktops and apps with VMware Horizon® Air™ Hybrid-mode.
Posted: 04 Jan 2017 | Published: 13 Dec 2016

VMware

Hyperconverged Infrastructure Shrinks Complexity and Cost for VDI
sponsored by VMware
WHITE PAPER: Many organizations that could gain from desktop and application virtualization have, until now, shied away from it due to the costs and complexities often associated with deployment. Download this white paper to address the challenges to be aware of, and the modern approaches that can end-users are productive.
Posted: 12 Dec 2016 | Published: 30 Sep 2016

VMware

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

A Comprehensive Guide to Enterprise IoT Project Success
sponsored by Xively by LogMeIn
EGUIDE: Whether you're just starting to learn about the Internet of Things (IoT) or you're well into your assessment of how this paradigm shift will impact your organization, this e-guide can help by providing valuable insights into the current state of IoT platforms and examples of how the IoT is affecting business processes now.
Posted: 03 Jun 2016 | Published: 03 May 2016

Xively by LogMeIn

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

CW500:Future Gazing 2020 (II)
sponsored by ComputerWeekly.com
PRESENTATION: Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

A reference architecture for the IoE
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).
Posted: 03 Oct 2016 | Published: 03 Oct 2016

ComputerWeekly.com

How to enhance your network for the future
sponsored by ComputerWeekly.com
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 15 Aug 2016

ComputerWeekly.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement