Hardware  >   Computer Hardware  >   Personal Computers  >  

Laptop Computers

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Laptops
DEFINITION: A laptop computer, usually called a notebook computer by manufacturers, is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than 5 pounds and is 3 inches or less in thickness. Among the best-known  … 
Definition continues below.
Laptop ComputersReports
51 - 75 of 123 Matches Previous Page  | Next Page
Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

Considering a BYOPC Strategy
sponsored by SearchSecurity.com
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell Software
WHITE PAPER: Learn how to get ahead of mobile security threats and develop a pragmatic strategy to protect data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 15 Nov 2012 | Published: 15 Nov 2012

Dell Software

CW Buyer's Guide: Consumerisation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  
Posted: 17 Jul 2012 | Published: 05 Jan 2012

ComputerWeekly.com

Enterprise CIO Decisions: Managing the Mobile Workforce
sponsored by SearchSecurity.com
EZINE: Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.
Posted: 09 Jul 2012 | Published: 30 Jun 2011

SearchSecurity.com

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

SearchSecurity.com

How Micro-Electro-Mechanical systems are taking over mobile devices
sponsored by ComputerWeekly.com
ANALYST BRIEF: In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks.
Posted: 23 Apr 2012 | Published: 06 Feb 2012

ComputerWeekly.com

E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

E-Guide: Best Practices to ensure secure mobile communication
sponsored by SearchSecurity.com
EGUIDE: Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Computer Weekly – 29 January 2013: The end of the PC refresh cycle?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now.
Posted: 28 Jan 2013 | Published: 29 Jan 2013

ComputerWeekly.com

Intel Laptop Processor Comparison Tool
sponsored by Intel
ASSESSMENT TOOL: See how you can use this handy comparison tool to evaluate the performance, security, and manageability features and benefits of different laptop processors. Strategically choose the solution that best matches your business needs -- click through now to get started!
Posted: 31 Dec 2012 | Published: 31 Dec 2012

Intel

E-Guide: Best Practices for Installing Windows 8 on Your Laptop
sponsored by Dell, Inc. and Microsoft
EGUIDE: This e-guide takes a first look at Windows 8 features and discusses best practice for installing this OS upgrade. Discover how to streamline deployment for your laptops and review the security and user interface enhancements of this latest Microsoft OS.
Posted: 13 Nov 2012 | Published: 13 Nov 2012

Dell, Inc. and Microsoft

Cloud-delivered Endpoint Security
sponsored by Webroot
WHITE PAPER: Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012

Webroot

Research Report: Understand the True Cost of Data Encryption - Like Never Before
sponsored by WinMagic
RESEARCH CONTENT: World renowned Dr. Larry Ponemon, chairman of the Ponemon Institute presents the ground-breaking results of this revolutionary study on the True Cost of Data Encryption. Read this research report to learn how organisations around the world can lower the total cost of IT ownership while protecting their devices - with WinMagic data encryption.
Posted: 16 Aug 2012 | Published: 16 Aug 2012

WinMagic

Two-factor Authentication: A Tokenless Approach
sponsored by PortalGuard
WHITE PAPER: Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

PortalGuard

Citrix XenClient Virtual desktops… to go
sponsored by Citrix Systems, Inc.
PRODUCT OVERVIEW: This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Citrix Systems, Inc.

How Mobility is Changing the Video Conferencing Landscape: Industry Trends and Deployment Best Practices
sponsored by LifeSize
WHITE PAPER: This paper explores the growing prominence of personal video conferencing in organizations today and offers tips and best practices for collaboration success. Uncover the latest trends, available benefits, case studies, and more!
Posted: 25 Jul 2012 | Published: 25 Jul 2012

LifeSize

Cloud-based File Management System for BlackBerry PlayBook Tablet Customers
sponsored by BlackBerry
WHITE PAPER: Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Presentation Transcript: Navigating the smartphone and tablet explosion
sponsored by AppSense
PRESENTATION TRANSCRIPT: This webcast transcript highlights the challenges of navigating the smartphone and tablet explosion. Discover key strategic issues that enterprise IT teams are facing and how to overcome them. Learn how your organization can more easily and securely manage its mobile devices.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

AppSense

Mobilize to Rightsize Your Network
sponsored by Aruba Networks
WHITE PAPER: Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!
Posted: 30 May 2012 | Published: 14 Mar 2011

Aruba Networks

Conquering Today's Bring-Your-Own-Device Challenges
sponsored by Aruba Networks
WHITE PAPER: It is vital to consider the effect BYOD will have on your network before allowing it in your enterprise. In this resource discover the new networking requirements of BYOD to help you embrace it for the better of your enterprise.
Posted: 15 Apr 2012 | Published: 23 Mar 2012

Aruba Networks

LaRue County High School is Improving Student Engagement and Teacher Satisfaction
sponsored by Dell, Inc.
CASE STUDY: Read this case study to learn why LaRue County High School in Kentucky deployed a Dell Latitude netbook running Windows 7 to each of its 760 students and was aided by Dell Professional Learning Services, which helped the teachers bring to life a 21st-century learning environment that integrated netbooks into the curriculum on a daily basis.
Posted: 08 Mar 2012 | Published: 14 Dec 2011

Dell, Inc.

What You Need to Know About the Costs of Mobility  
sponsored by iPass Inc.
WHITE PAPER: Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Remote Laptop Backup 101
sponsored by Code42
EGUIDE: This expert E-Guide dives into everything laptop backup as it explores the challenges of remote laptop backup today, different remote laptop backup approaches and best practices. Read on to learn more.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

Code42
51 - 75 of 123 Matches Previous Page    1 2 3 4 5    Next Page
 
LAPTOP COMPUTERS DEFINITION (continued): …  makers of laptop computers are IBM, Apple, Compaq, Dell, and Toshiba. Laptop computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. A laptop can effectively be turned into a desktop computer with a docking station, a hardware frame that supplies connections for peripheral input/output devices such as a printer or larger monitor. The less capable port replicator allows you to connect a laptop to a number of peripherals through a single plug.Laptops usually come with displays that use thin-screen technology. The … 
Laptop Computers definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement