Hardware  >   Computer Hardware  >   Personal Computers  >  

Laptops

RSS Feed    Add to Google    Add to My Yahoo!
LaptopsReports
 
Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Top 10 BYOD Pitfalls to Avoid
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013

SearchSecurity.com

5 Sources of Endpoint Backup Grief
sponsored by Code42
WHITE PAPER: This informative white paper discusses the five common stages of enterprise endpoint backup grief, detailing the common mistakes that organizations make while trying to deal with data loss and leakage. Read on and learn how you can skip these stages and adopt an effective solution.
Posted: 07 Aug 2013 | Published: 07 Aug 2013

Code42

Understanding BlackBerry Balance
sponsored by BlackBerry
WEBCAST: This webcast explores a new security feature built into BlackBerry® that allows IT admins to keep an end-user's personal and professional data separate.
Posted: 10 Jul 2013 | Premiered: Jul 10, 2013

BlackBerry

9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution
sponsored by ClickSoftware
WHITE PAPER: This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.
Posted: 04 Apr 2013 | Published: 31 Dec 2012

ClickSoftware

Mobility is here to stay – Is your data is backed up?
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

Evolving Security Tech Presents New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Protecting Lost or Stolen PCs
sponsored by Intel
VIDEO: Learn more about how the all new Intel® Core™ vPro™ processor family can better protect lost or stolen PCs.
Posted: 27 Apr 2010 | Premiered: 22 Apr 2010

Intel

Quickly access patient data with enhanced security
sponsored by Hewlett-Packard Company
WHITE PAPER: This whitepaper gives an overview of the HP mt40, a thin client tailored for business-needs and promises high reliability, low ownership costs, PC-like performance, faster processing power, and flexible battery options. Read on to learn more about the HP mt40, including features, specifications, support services and more.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement