Hardware  >   Peripheral Hardware  >  

Scanning Monitors

RSS Feed    Add to Google    Add to My Yahoo!
Scanning Monitors Reports
 
Guide to fixing a disable computer with a flashing power light
sponsored by Dell India
VIDEO: Access this informative video to see an in-depth demonstration of how to fix the power supply on a desktop computer in order to get it started working again.
Posted: 13 Apr 2015 | Premiered: 23 Oct 2014

Dell India

MMD study: Increase health of deskworkers with the right IT equipment
sponsored by MMD
WHITE PAPER: The following white paper explores the benefits of how pairing your workforce with an ergonomic monitor can alleviate a large portion of pain and fatigue, ultimately increasing their well-being, happiness, and efficiency. Read on to learn more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

MMD

Dell introduces all-in-one desktop solutions
sponsored by Dell India
VIDEO: This brief video highlights two all-in-one desktop solutions designed to enable enhanced employee performance and productivity.
Posted: 09 Apr 2015 | Premiered: 27 Nov 2014

Dell India

Expands the workspace with one single cable
sponsored by MMD
PRODUCT OVERVIEW: Check out the following solution brief to get a firsthand look at what's new to the world of docking stations. See how with USB 3.0 you can virtually eliminate the need for excess wires, actually increase worker well-being, and more.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

MMD

A More Efficient and Flexible Approach to Storage in Virtual Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the new VMware Virtual SAN 6.0, which is a storage solution that combines the compute and storage resources of vSphere hosts.
Posted: 23 Mar 2015 | Published: 28 Feb 2015

VMware, Inc.

Comparing Solid-State Storage Architectures
sponsored by Solidfire
WHITE PAPER: Access this white paper to compare two solid-state storage systems, and decide if one is right for your business.
Posted: 06 Apr 2015 | Published: 31 Jul 2014

Solidfire

Group-Based Policy for OpenStack
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper introduces the new OpenStack Group-Based Policy (GBP) framework designed to offer a new set of API extensions to manage OpenStack infrastructure through declarative policy abstractions. Find out how GBP is based on four main concepts and explore a broad range of use cases.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Take Control Over Your Application Performance
sponsored by Citrix
WHITE PAPER: This white paper highlights a solution that can help you overcome 9 key datacenter and cloud architecture challenges.
Posted: 18 Nov 2014 | Published: 30 Jun 2014

Citrix

Changing the Data Center Economics with All-Flash Arrays
sponsored by Kaminario
WHITE PAPER: Access this white paper to discover how an all-flash array is changing the economics of the data center by benefitting key areas
Posted: 04 Mar 2015 | Published: 30 Nov 2014

Kaminario

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

Security University - Advanced Endpoint Threat Defense Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson will take you through all those considerations, including device and application control, antimalware considerations, data protection and integration with network monitoring, SIM and log management solutions.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

SearchSecurity.com

Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

CW Special Report on CA Technologies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

Unifying Healthcare Documents and Images Across the Continuum
sponsored by GE Healthcare
BROCHURE: To help drive efficiency in your healthcare practice, view this white paper and learn how to unify patient images and documents across the care continuum. Read on to learn about the technology foundation you need as well as the strategies to help get you there.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

GE Healthcare

Intelligent tools for a productive radiologist workflow: How machine learning enriches hanging protocols
sponsored by GE Healthcare
WHITE PAPER: This white paper explores the tools required for a productive radiologist workflow. Read on to learn how machine learning, smart reading protocols (SRP) can provide an innovative and simplified process for creating and applying hanging protocols and more.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

GE Healthcare

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by SearchSecurity.com
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

SearchSecurity.com

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Outsourcing the problem of software security
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle.
Posted: 10 Jul 2012 | Published: 10 Jul 2012

ComputerWeekly.com

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Improving patient care with enterprise imaging
sponsored by GE Healthcare
WHITE PAPER: With increasing demand on healthcare to deliver integrated care on lower budgets, having the right imaging system can make all the difference. View this white paper to learn how with the right imaging system in place, healthcare providers can improve workflow, enhance collaboration, and deliver better quality care. Read on to learn more.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

GE Healthcare

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Overcoming APT and Today’s Sophisticated Malware
sponsored by SearchSecurity.com
EGUIDE: In this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.
Posted: 02 Apr 2012 | Published: 02 Apr 2012

SearchSecurity.com

Gauntlet Case Study
sponsored by CloudPassage
WHITE PAPER: Access this informative resource to find out what happened when 367 people participated in a liver server exploitation exercise that ran for 23 days across a collection of Microsoft Windows and Linux-based servers with varying combinations of applications and application frameworks installed.
Posted: 04 Sep 2014 | Published: 04 Dec 2013

CloudPassage

Product Comparison: Network Performance Monitoring
sponsored by IT Central Station
ESSENTIAL GUIDE: With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Best Practices for Mobile Device Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE: This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013

Webroot

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Uncover The Advantages Behind Standardized MSP Reports
sponsored by N-able Technologies
WHITE PAPER: Discover why professional, standardized reports have emerged as a key success factor for many MSPs and IT services providers, helping prove relevance and demonstrate the value of service delivered to their clients. View now to learn how such reporting can help you gain the title of "Trusted Advisor."
Posted: 06 Dec 2012 | Published: 06 Dec 2012

N-able Technologies

FM, IT and Data Centres
sponsored by ComputerWeekly.com
ANALYST REPORT: Are Facilities and IT data centre managers implacable enemies, or is it a case of different work priorities, asks analyst Clive Longbottom.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement