Hardware  >   Computer Hardware  >  

LISA

RSS Feed    Add to Google    Add to My Yahoo!
LISA Reports
 
Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer
sponsored by Intel
ANALYST REPORT: For every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.
Posted: 27 Apr 2010 | Published: 01 Feb 2010

Intel

PC Refresh Rundown Card
sponsored by Insight & Intel
WHITE PAPER: Millions of corporate PCs in use today are four or more years old, which can cause serious security, cost, and maintenance issues. Is it time for your business to refresh PCs? View this brief resource to find out.
Posted: 06 Mar 2014 | Published: 31 Dec 2013

Insight & Intel

Enterprise PC Backup Software – Backup requirements
sponsored by Copiun
JOURNAL ARTICLE: Access this resource to learn exactly what factors need to be taken into consideration when deciding what PC backup solution is most suitable for your organization.
Posted: 24 Aug 2010 | Published: 02 Jun 2010

Copiun

Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles
sponsored by Wipro Technologies
WHITE PAPER: Written for IT decision makers and practitioners across industry verticals who are responsible for managing fleets of laptop and desktop PCs, this paper provides a TCO assessment framework for optimal PC refresh rates based on Equivalent Annual Cost analysis..
Posted: 12 Jun 2009 | Published: 01 May 2009

Wipro Technologies

Implementing business tablets instead of BYOD
sponsored by Kensington
EGUIDE: Discover why tablets are overtaking BYOD, use cases of tablets in the workplace, plus which tablet is leading the change.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

Kensington

How to Let Staff Use Their Personal Technology Securely
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Many progressive companies see distinct advantages in allowing employees to use personal computers in the office. However, letting employees bring their own technology into the network might mean letting them bring vulnerabilities to network security. Read this paper to learn how to let staff use their personal technology securely.
Posted: 28 Apr 2010 | Published: 28 Apr 2009

AVG Technologies USA, Inc.

Where Does Storage Data Virtualization Live?
sponsored by Forsythe
WEBCAST: Learn why you can’t afford to wait on storage virtualization and get some great storage virtualization implementation tips in this webcast.
Posted: 23 Nov 2009 | Premiered: Nov 23, 2009

Forsythe

Evaluating Thin-Client Security in a Changing Threat Landscape
sponsored by Intel
WHITE PAPER: Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.
Posted: 28 Apr 2010 | Published: 01 Apr 2010

Intel

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Intel vPro Technology Launch Video
sponsored by Intel Corporation
WEBCAST: Business Desktop PCs with Intel vPro technology provide down-the-wire proactive security and manageability capabilities for your every business needs'-even when the user's environment is inoperable.
Posted: 02 Oct 2006 | Premiered: Oct 2, 2006

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement