Hardware  >   Computer Hardware  >   Personal Computers  >  

Laptop Computers

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Laptops
DEFINITION: A laptop computer, usually called a notebook computer by manufacturers, is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than 5 pounds and is 3 inches or less in thickness. Among the best-known  … 
Definition continues below.
Laptop ComputersReports
26 - 50 of 123 Matches Previous Page  | Next Page
IDC: Critical Need For Edge Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault

Enterprise Mobility Adoption and Security Considerations
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide from searchEnterpriseDesktop.com examines the detailed benefits of increased mobility and addresses the key areas to be considered when it comes to mobile security, particularly laptop usage and practices you can follow to avoid security breaches.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SearchSecurity.com

Top 10 Endpoint Backup Mistakes
sponsored by Druva Software
WHITE PAPER: Access this resource to find out how you can avoid common endpoint backup mistakes.
Posted: 10 Feb 2014 | Published: 31 Mar 2013

Druva Software

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Deliver Virtualised Windows Apps to Your Organisation through FlexCast Technology
sponsored by Citrix
WHITE PAPER: Read this brief to see how XenDesktop with FlexCast technology gives IT everything they need to meet the needs of today's modern, complex workforce—one use case at a time.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

The Most Effective Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This infographic outlines the top use cases for desktop virtualization and how it can help address these issues.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Citrix

5 Common Stages of Enterprise Endpoint Backup Grief
sponsored by Code42
WHITE PAPER: This informative white paper discusses the five common stages of enterprise endpoint backup grief, detailing the common mistakes that organizations make while trying to deal with data loss and leakage. Read on and learn how you can skip these stages and adopt an effective solution.
Posted: 07 Aug 2013 | Published: 07 Aug 2013

Code42

Top 10 BYOD Pitfalls to Avoid
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

SearchSecurity.com

Windows 8 Secrets
sponsored by ComputerWeekly.com
BOOK: Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

ComputerWeekly.com

Mobile Device Data Protection: Key Findings and Players in the Market
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

SearchSecurity.com

Trends in Enterprise Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CW Special Report on HP
sponsored by ComputerWeekly.com
WHITE PAPER: This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.
Posted: 23 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

Enterprise mobility management: Choosing the right approach and considering costs
sponsored by SearchSecurity.com
EGUIDE: Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

File Sync and Share: Recent Developments and Points to Address in your Usage Policy
sponsored by Dropbox for Business
EGUIDE: This e-guide recounts the latest advances in enterprise collaboration technology and explains why security remains a top priority for the companies that leverage it. Read on to learn more.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

Dropbox for Business

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
sponsored by Symantec Corporation
EGUIDE: This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation

The Explosive Growth of Data and BYOD Trends Part 1
sponsored by Cleversafe
VIDEO: This informative video explores today's changing world of technology including how the explosive growth of data and BYOD trends are affecting cloud storage technologies. Watch now to learn more.
Posted: 31 Oct 2013 | Premiered: 31 Oct 2013

Cleversafe

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec Corporation
WHITE PAPER: Access this white paper for crucial information regarding the infiltration of employees' personal mobile devices within the workplace, and uncover the top 6 new mobile data loss and security risks to avoid.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Symantec Corporation

3 Cloud Backup Services Ease Protection of Laptops
sponsored by Code42
EGUIDE: This e-guide examines three types of cloud backup services and the key factors you need to consider when evaluating them.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

Code42

MicroScope August 2013: A special issue covering innovation in the PC market
sponsored by MicroScope
EZINE: A themed issue examining the potential revenue opportunities for resellers including hardware in their sale pitches.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

MicroScope

Quickly access patient data with enhanced security
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper gives an overview of the HP mt40, a thin client tailored for business-needs and promises high reliability, low ownership costs, PC-like performance, faster processing power, and flexible battery options. Read on to learn more about the HP mt40, including features, specifications, support services and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Hewlett-Packard Company

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013

BlackBerry

9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution
sponsored by ClickSoftware
WHITE PAPER: This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.
Posted: 04 Apr 2013 | Published: 31 Dec 2012

ClickSoftware
26 - 50 of 123 Matches Previous Page    1 2 3 4 5    Next Page
 
LAPTOP COMPUTERS DEFINITION (continued): …  makers of laptop computers are IBM, Apple, Compaq, Dell, and Toshiba. Laptop computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. A laptop can effectively be turned into a desktop computer with a docking station, a hardware frame that supplies connections for peripheral input/output devices such as a printer or larger monitor. The less capable port replicator allows you to connect a laptop to a number of peripherals through a single plug.Laptops usually come with displays that use thin-screen technology. The … 
Laptop Computers definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement