Hardware  >   Peripheral Hardware  >  

Video Terminals

RSS Feed    Add to Google    Add to My Yahoo!
Video Terminals White Papers (View All Report Types)
 
MMD study: Increase health of deskworkers with the right IT equipment
sponsored by MMD
WHITE PAPER: The following white paper explores the benefits of how pairing your workforce with an ergonomic monitor can alleviate a large portion of pain and fatigue, ultimately increasing their well-being, happiness, and efficiency. Read on to learn more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

MMD

Multiple Monitors in the Mobile World
sponsored by TechData - Samsung
WHITE PAPER: This white paper takes looks at how businesses and organizations are benefiting from investing in desktop displays in an increasingly mobile world. Learn how to design an ergonomic office that will benefit your employees and your bottom line.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

TechData - Samsung

Tools of Today's Trade
sponsored by TechData - Samsung
WHITE PAPER: Access this white paper to learn how the tools of the modern workforce have evolved over the last 20 years, and find out what kind of tools your workforce needs right now, to enhance productivity.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechData - Samsung

DCIG Buyer's Guide for Midmarket Enterprise Storage Arrays
sponsored by Tegile, a Western Digital brand
WHITE PAPER: The DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide serves the needs of the midmarket technology buyer, collecting data on 17 of the top products in the industry and presenting that data in easy-to-consume one-page summaries. The analyst firm focused its evaluation on storage arrays with a maximum raw storage capacity of 500TB.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Tegile, a Western Digital brand

The Productivity Puzzle: How to Get the Very Best out of Your People in the Modern Workplace
sponsored by Microsoft
WHITE PAPER: Productivity remains one of the top issues facing small and medium-sized businesses (SMBs) today. And while there's no doubting the importance of trying to get the most out of your talent, the approach many SMBs take actually has the reverse effect. This is the 'productivity puzzle.' Have you fell victim? Find out in the following white paper.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

Microsoft

Riverbed Hyper-converged Edge
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Take a look at the architecture of traditional HCIs and how organizations are turning to stateless, rather than stateful, hyper-converged architectures to overcome common remote office dilemmas.
Posted: 17 Dec 2015 | Published: 17 Dec 2015

Riverbed Technology, Inc.

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution
sponsored by Red Hat and Intel
WHITE PAPER: This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Red Hat and Intel

Desktop Monitors: It's All About the Right Connections
sponsored by TechData - Samsung
DATA SHEET: Doing business is all about making the right connections. Same applies to your laptops and computers. Access this data sheet to learn how to best connect your desktop monitors for optimal function and cost reduction.
Posted: 14 Sep 2017 | Published: 30 Jun 2017

TechData - Samsung

Desktop Monitor Overview
sponsored by TechData - Samsung
EBOOK: Desktop monitors. Everyone needs them and everyone overlooks the impact they have on the workplace until one of them stops working. Take a minute to skim this e-book and learn about the latest advances in desktop monitor technology to see how it can impact your employees' productivity.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

TechData - Samsung

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

A Mobile Application Management Primer for IT
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

SearchSecurity.com

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by SearchSecurity.com
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Mobile Security Software Keeps Corporate Data Safe
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

BYOD: An Opportunity for IT Evolution
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Mobile Device Management: Fundamental steps for success
sponsored by SearchSecurity.com
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

SearchSecurity.com

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Your Guide to Mobile Application Management
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement