Hardware  >   Computer Hardware  >  

Macintosh II

RSS Feed    Add to Google    Add to My Yahoo!
Macintosh II Reports
 
Video: The All New 2010 Intel Core Processor Family for Business PCs-- Deploy with Confidence
sponsored by Intel
VIDEO: Watch this brief video to learn how the 2010 Intel Core Processor family prepares your business for today's needs and for tomorrow.
Posted: 27 Sep 2010 | Premiered: 27 Sep 2010

Intel

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

IT Handbook: Windows 8 Migration Station
sponsored by Dell, Inc. and Microsoft
EBOOK: This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

Dell, Inc. and Microsoft

Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles
sponsored by Wipro Technologies
WHITE PAPER: Written for IT decision makers and practitioners across industry verticals who are responsible for managing fleets of laptop and desktop PCs, this paper provides a TCO assessment framework for optimal PC refresh rates based on Equivalent Annual Cost analysis..
Posted: 12 Jun 2009 | Published: 01 May 2009

Wipro Technologies

Evaluating Thin-Client Security in a Changing Threat Landscape
sponsored by Intel
WHITE PAPER: Intel IT's security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Continue reading to learn more about our analysis and conclusions in this paper.
Posted: 28 Apr 2010 | Published: 01 Apr 2010

Intel

Getting Ahead of Malware
sponsored by Intel
WHITE PAPER: To minimize the threat of Malware, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches Intel’s user base. Continue reading to learn more.
Posted: 28 Apr 2010 | Published: 01 Dec 2009

Intel

Protecting Lost or Stolen PCs
sponsored by Intel
VIDEO: Learn more about how the all new Intel® Core™ vPro™ processor family can better protect lost or stolen PCs.
Posted: 27 Apr 2010 | Premiered: 22 Apr 2010

Intel

PCs as Strategic Assets
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this paper you'll learn how managing PCs as strategic assets, streamlining processes, and buying more-capable PCs with built-in manageability that improve productivity and security, not only reduces TCO but also delivers measurable top-line benefits year after year.
Posted: 17 Aug 2010 | Published: 01 May 2009

Dell, Inc. and Intel®

BMW Takes Remote Control: Automating Enterprise Management with Intel Active Management Technology
sponsored by Intel Corporation
CASE STUDY: Evaluation tests from BMW revealed that by integrating Intel® Active Management Technology, BMW could significantly increase its remote management capabilities and further strengthen security.
Posted: 02 Oct 2006 | Published: 01 Oct 2006

Intel Corporation

All New 2010 Intel® Core™ vPro™ Processor Family Brochure
sponsored by Intel
BROCHURE: Learn more about the cost-saving manageability, smart security, intelligent performance and broad industry support delivered by the all new 2010 Intel Core processor family.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement