Hardware  >   Computer Hardware  >   Personal Computers  >  

Laptops

RSS Feed    Add to Google    Add to My Yahoo!
LaptopsReports
 
Mobile Device Data Protection: Key Findings and Players in the Market
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

SearchSecurity.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

CrashPlan Enterprise Endpoint Backup Overview
sponsored by Code42
WHITE PAPER: This white paper describes a solution that runs invisibly and continuously, protecting all critical business data stored on laptops and desktops, regardless of platform.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

FlexCast Technology Powers Workforce Mobility
sponsored by Citrix
WHITE PAPER: Read this brief to see how XenDesktop with FlexCast technology gives IT everything they need to meet the needs of today's modern, complex workforce—one use case at a time.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Intel

More advanced business-class management, security, and reliability than Lenovo. Do more with Dell OptiPlex.
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper examines a laptop device designed specifically to meet the needs of the modern workforce and IT department.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Dell, Inc.

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

Dell Latitude E4200 & Microsoft Windows 7: Better Together
sponsored by Dell, Inc. and Microsoft Windows 7
TEST RESULTS: This paper details key performance results when comparing a new Dell Latitude E4200 laptop running Microsoft® Windows® 7 with an older Latitude D610 and D620, both running Microsoft® Windows XP.
Posted: 19 Aug 2010 | Published: 19 Aug 2010

Dell, Inc. and Microsoft Windows 7
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement