Hardware  >   Computer Hardware  >   Personal Computers  >  

Tablet PC

RSS Feed   
ALSO CALLED: Tablet Computers, Tablets
DEFINITION: 1) In general, a tablet PC is a wireless personal computer (PC) that allows a user to take notes using natural handwriting with a stylus or digital pen on a touch screen. A tablet PC is similar in size and thickness to a yellow paper notepad and is intended to function as the user's primary personal computer as well as a note-taking device. Tablet PCs generally have two formats, a convertible model  … 

Tablet PC definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Tablet PC Reports
226 - 250 of 417 Matches Previous Page  |  Next Page
Trends in Enterprise Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

Microsoft catches up with iPad support for Dynamics CRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Nucleus Research assesses Microsoft's long-awaited announcement for iPad support and new Yammer capabilities for Dynamics CRM.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

Enterprise mobility management: Choosing the right approach and considering costs
sponsored by SearchSecurity.com
EGUIDE: Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by SearchSecurity.com
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by SearchSecurity.com
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Mobile EndPoint Security and Management - Best Practices
sponsored by SearchSecurity.com
EGUIDE: Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Choosing an MDM System: Fundamental Features for Success
sponsored by SearchSecurity.com
EGUIDE: There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by SearchSecurity.com
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

BYOD: An Opportunity for IT Evolution
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Desktop Admin for BYOD: Security Chapter
sponsored by SearchSecurity.com
WHITE PAPER: The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

SearchSecurity.com

Defining and Enforcing a Clear Mobile Device Security Policy
sponsored by SearchSecurity.com
EGUIDE: If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Mobile Collaboration: Strategies and Challenges
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

SearchSecurity.com

CW Buyer's Guide: Tablets for business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

ComputerWeekly.com

Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Choosing and Managing Mobile Devices Chapter 2: Evaluating Mobile Device Management Products
sponsored by SearchMobileComputing
EBOOK: This expert resource will help readers examine the capabilities of contemporary MDM products and their desirable features. Find out how these tools can help boost workplace performance as well as the limitations you should watch out for.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchMobileComputing

9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution
sponsored by ClickSoftware
WHITE PAPER: This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.
Posted: 04 Apr 2013 | Published: 31 Dec 2012

ClickSoftware

Getting a Grasp on ALM Requirements
sponsored by Hewlett-Packard Enterprise
EBOOK: This three-part guide offers expert advice to help you get a handle on application lifecycle management (ALM) requirements. Uncover the new challenges introduced by increasingly dispersed teams and mobile apps, and learn how you can drive requirements management success by reading on now.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

Hewlett-Packard Enterprise

CW Europe – February Edition
sponsored by ComputerWeekly.com
EZINE: Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing.
Posted: 05 Feb 2013 | Published: 04 Feb 2013

ComputerWeekly.com

BYOD and the new network access
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com

Computer Weekly – 29 January 2013: The end of the PC refresh cycle?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now.
Posted: 28 Jan 2013 | Published: 29 Jan 2013

ComputerWeekly.com
226 - 250 of 417 Matches Previous Page    8 9 10 11 12 13    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement