Hardware  >   Peripheral Hardware  >  

Video Terminals

RSS Feed   
Video Terminals Multimedia (View All Report Types)
Optimize Retail Workflows with Advanced Barcode Scanning
sponsored by Scandit
WEBCAST: Watch this short video to discover barcode scanning technology that optimizes retail workflows including inventory management, self checkout, order entry, shipping and receiving and more.
Posted: 01 Mar 2018 | Premiered: Mar 1, 2018


The 3 Signs you are Getting Routered
sponsored by Silver Peak
VIDEO: In this video, uncover the 3 ways your organization is getting routered into endless hardware refresh cycles.
Posted: 11 Dec 2017 | Premiered: 11 Dec 2017

Silver Peak

Replace Desktop PC and Desk Phones with a Raspberry Pi
sponsored by Citrix
VIDEO: Hardware consolidation enables you to improve your security, user experience, and lower overall cost. Tune in to learn how low cost devices can not only replace costly hardware, but also less expensive tools that quickly add up, like desktop phones.
Posted: 07 Feb 2018 | Premiered: 09 Nov 2017


Unity EdgConnect: SD-WAN Strategy Overview
sponsored by Silver Peak
VIDEO: SD-WAN managed services offers many benefits for IT network pros, including enhanced user-experience and business operational efficiencies. In this video, gain a better understanding of how to overcome SD-WAN deployment challenges as you migrate towards a high-performing WAN solution.
Posted: 08 Dec 2017 | Premiered: 08 Dec 2017

Silver Peak

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

Optimizing for the Cloud with Data Center Virtualization
sponsored by Brocade
WEBCAST: Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012


IBM Cloud – Cloud Without Compromise
sponsored by IBM
VIDEO: Find out how you can have the ideal cloud system your infrastructure craves.
Posted: 10 Jun 2014 | Premiered: 28 Apr 2014


In-Depth Look at the Power 2822LC Server
sponsored by IBM
WEBCAST: Ever want to take a look under the hood of a server before you decide to invest? Watch this 5 minute video to take an in-depth look at the Power 2822LC server. This video deconstructs a server to discuss how it is made and why it is the way it is.
Posted: 03 Aug 2017 | Premiered: Aug 1, 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement