Hardware  >   Computer Hardware  >   Personal Computers  >  

Tablet PC

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tablet Computers, Tablets
DEFINITION: 1) In general, a tablet PC is a wireless personal computer (PC) that allows a user to take notes using natural handwriting with a stylus or digital pen on a touch screen. A tablet PC is similar in size and thickness to a yellow paper notepad and is intended to function as the user's primary personal computer as well as a note-taking device. Tablet PCs generally have two formats, a convertible model  … 
Definition continues below.
Tablet PCReports
1 - 25 of 462 Matches Previous Page  | Next Page
Dell Enterprise Mobility Management
sponsored by Dell Software
WHITE PAPER: This exclusive white paper details everything you need to know about mobility, including an in-depth look at one solution that can give an organization complete control to harness the power of BYOD. Read on to learn more.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software

Dell Business Phone Enables BYOD
sponsored by Dell Software
WHITE PAPER: The exclusive white paper details a business phone solution that's able to keep up with today's modern worker, a mobile one. Read on to learn more.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software

Enterprise Data Access on Mobile Devices
sponsored by Dell Software
WHITE PAPER: This exclusive white paper takes an in-depth look at the mobile workspace and how you can get the most out of mobility. Read on to learn more.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Dell Software

Developing New User BYOD Agreements
sponsored by Dell Software
WHITE PAPER: This exclusive resource takes an in-depth look at key factors when making the switch to better BYOD. Read on to learn more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Dell Software

OFS and BaaS – Why You Need both
sponsored by Code42
WEBCAST: Watch this webcast to hear ESG Senior Analysts Jason Buffington and Teri McClure discuss the importance of protecting endpoint devices, how OFS and BaaS are similar and why they're both necessary.
Posted: 21 Oct 2014 | Premiered: Dec 4, 2013

Code42

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Performance optimized 802.11ac/n Dual-Radio 3x3:3access point with internal antenna option
sponsored by Aerohive Networks
WHITE PAPER: This white paper details a network solution that was able to deliver rock solid connection even in the most high-density environments. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Aerohive Networks

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Local Authority Guide to Emerging Transport Technology
sponsored by ComputerWeekly.com
EGUIDE: This will help local authorities make use of new technologies, such as big data analytics and cloud computing, to revolutionise their local transport systems and reduce costs.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Smartphones Are Security Solutions
sponsored by HID
WHITE PAPER: This white paper highlights the smartphone's potential for enabling a strong authentication strategy.
Posted: 02 Oct 2014 | Published: 17 Aug 2014

HID

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

CW Buyer's Guide to Apple in the Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

ComputerWeekly.com

Making Tablets a Business Asset with a Unified Workspace
sponsored by NComputing
WHITE PAPER: This video will help you learn about a unified workspace solution designed to leverage cloud, hybrid and on-premise delivery models and optimize tablet-based app and file access.
Posted: 23 Sep 2014 | Published: 23 Sep 2014

NComputing

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.
1 - 25 of 462 Matches Previous Page    1 2 3 4    Next Page
 
TABLET PC DEFINITION (continued): …  with an integrated keyboard and display that rotates 180 degrees and can be folded down over the keyboard -- or a slate style, with a removable keyboard. The user's handwritten notes, which can be edited and revised, can also be indexed and searched or shared via e-mail or cell phone. The idea of tablet computing is generally credited to Alan Kay of Xerox, who sketched out the idea in 1971. The best-known and first widely-sold tablet computer was Apple Computer's Newton, which was not a commercial success. With today's extended battery life, better display resolution, handwriting recognition … 
Tablet PC definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement