Standards  >  

Terminal Emulation Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Terminal Emulation ProtocolsReports
 
Pinewood Studios: Desktop Area Networking and KVM over IP Switching
sponsored by Avocent
CASE STUDY: This whitepaper explains how Pinewood Studios, a film television and commercial production based in England, was able to create access to servers located in one secure area from various workstation positions – with no previous infrastructure in place.
Posted: 14 May 2014 | Published: 14 May 2014

Avocent

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

E-Book: Strategic guide to insider threat detection and breach response
sponsored by SearchSecurity.com
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SearchSecurity.com

Enable Secure Remote Access to 3D Data Without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This whitepaper examines a technology strategy designed to enable secure, real-time remote collaboration on design data and model-based deliverables with optimized visual performance.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Establishing an Effective Application Strategy for your Mobile Enterprise
sponsored by IBM
WHITE PAPER: The explosion of enterprise applications has made it possible for many employees to work anywhere, anytime. IT is pressed to deliver security-rich applications across platforms and devices. This white paper provides an overview to help you establish an effective mobile application strategy.
Posted: 12 Aug 2011 | Published: 12 Aug 2011

IBM

Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

Windows PowerShell 2.0
sponsored by Microsoft
WEBCAST: Explore how Windows PowerShell 2.0 can help increase the productivity of IT professionals by providing a powerful, complete scripting language to automate repetitive tasks and conduct remote troubleshooting. It delivers a growing set of cmdlets that can be used to manage Windows-based PCs and servers, and it can be easily extended.
Posted: 12 Jun 2009 | Premiered: Jan 9, 2009

Microsoft

Juniper Networks VPN Decision Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper looks at how IPsec and SSL VPNs differ, and examines the criteria for deciding which technology best fits each business need. It is an ideal resource for IT personnel trying to determine when to deploy IPsec VPN vs. SSL VPN for their companies’ remote access needs.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Juniper Networks, Inc.

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement