Standards  >  

Terminal Emulation Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Terminal Emulation Protocols Reports
 
Accelerate Business Through a Cost-efficient Virtual Workforce: Citrix Transforms IT into an On-Demand Service for Virtual Workers
sponsored by Citrix
WHITE PAPER: This white paper defines a virtual workforce, describes the challenges and requirements that organisations face when supporting a virtual workforce, and explains how Citrix solutions can address these requirements and scale accordingly to foster and support future growth.
Posted: 18 Sep 2009 | Published: 25 May 2009

Citrix

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

AT&T Mobile Remote Access Services
sponsored by AT&T Corp
PRODUCT OVERVIEW: AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AT&T Corp

MicroScope April 2014: A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling security, and advice on the use of social media.
Posted: 11 Apr 2014 | Published: 14 Apr 2014

MicroScope

Enable an Empowered and Distributed Workforce Through Managed Remote Services
sponsored by AT&T Corp
WHITE PAPER: To react quickly to customers’ needs, organizations are decentralizing their workforce and shifting them into the flow of their customers’ lives.
Posted: 27 Oct 2011 | Published: 27 Oct 2011

AT&T Corp

Secure Optimized Data Protection for Remote Offices
sponsored by Symantec Corporation
WHITE PAPER: Learn how to protect remote office data while simplifying backup and recovery tasks. Be better prepared for and recover more easily from equipment failure, virus attack or accidental loss of vital files.
Posted: 24 Apr 2006 | Published: 01 Feb 2006

Symantec Corporation

AT&T Virtual Tunneling Service
sponsored by AT&T Corp
WHITE PAPER: AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

AT&T Corp

Why Passwords Aren't Strong Enough: Making the Case for Strong Two-Factor Authentication
sponsored by RSA
WHITE PAPER: In this paper, we will examine the need for two-factor authentication and explore the return on investment that can be realized in order to help organizations make an informed decision when contemplating their strategic move toward stronger security.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

RSA

Presentation Transcript: VDI in Branch Offices
sponsored by Virtual Bridges
PRESENTATION TRANSCRIPT: This transcript of the video "Using VDI at a Branch Office" , featuring desktop virtualization experts Brian Madden and Gabe Knuth, provides guidelines for extending central management to remote locations.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Virtual Bridges

The Benefits of Client-Aware Cloud Computing for Mobile Users
sponsored by Intel
VIDEO: Mobility can be seen as both a challenge and an opportunity when it comes to client-aware cloud computing. Learn why.
Posted: 17 Aug 2011 | Premiered: 16 Aug 2011

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement