Hardware  >   Peripheral Hardware  >  

Terminals

RSS Feed    Add to Google    Add to My Yahoo!
Terminals White Papers (View All Report Types)
 
Multiple Monitors in the Mobile World
sponsored by TechData - Samsung
WHITE PAPER: This white paper takes looks at how businesses and organizations are benefiting from investing in desktop displays in an increasingly mobile world. Learn how to design an ergonomic office that will benefit your employees and your bottom line.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

TechData - Samsung

Tools of Today's Trade
sponsored by TechData - Samsung
WHITE PAPER: Access this white paper to learn how the tools of the modern workforce have evolved over the last 20 years, and find out what kind of tools your workforce needs right now, to enhance productivity.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechData - Samsung

MMD study: Increase health of deskworkers with the right IT equipment
sponsored by MMD
WHITE PAPER: The following white paper explores the benefits of how pairing your workforce with an ergonomic monitor can alleviate a large portion of pain and fatigue, ultimately increasing their well-being, happiness, and efficiency. Read on to learn more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

MMD

Rack Selection Guide
sponsored by Schneider Electric
WHITE PAPER: This white paper is your guide to choosing the rack to best support your data center based on the types of applications and equipment you need to run.
Posted: 28 Aug 2017 | Published: 29 Dec 2016

Schneider Electric

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Plan for Success when Migrating from GroupWise to Office 365
sponsored by Dell Software
WHITE PAPER: Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Dell Software

Goodbye to Windows Server 2003. Hello HP. Successfully migrate to the New Style of IT
sponsored by HP
WHITE PAPER: Read this transcript for five considerations that will convince you to migrate from Windows Server 2003.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

HP

Microsoft SQL Server 2012 Solutions for OLTP Applications on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Explore this exclusive white paper to find out about Dell's first shared IT infrastructure solution that's specifically designed for remote and small office environments.
Posted: 17 Feb 2014 | Published: 30 Jun 2013

Dell India

HP Device Manager 4.5 User Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett Packard Enterprise

Desktop Monitors: It's All About the Right Connections
sponsored by TechData - Samsung
DATA SHEET: Doing business is all about making the right connections. Same applies to your laptops and computers. Access this data sheet to learn how to best connect your desktop monitors for optimal function and cost reduction.
Posted: 14 Sep 2017 | Published: 30 Jun 2017

TechData - Samsung

Desktop Monitor Overview
sponsored by TechData - Samsung
EBOOK: Desktop monitors. Everyone needs them and everyone overlooks the impact they have on the workplace until one of them stops working. Take a minute to skim this e-book and learn about the latest advances in desktop monitor technology to see how it can impact your employees' productivity.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

TechData - Samsung

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by SearchSecurity.com
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

A Mobile Application Management Primer for IT
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

SearchSecurity.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Mobile Security Software Keeps Corporate Data Safe
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

Mobile Device Management: Fundamental steps for success
sponsored by SearchSecurity.com
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

SearchSecurity.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Your Guide to Mobile Application Management
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement