Hardware  >   Peripheral Hardware  >  

Video Display Terminals

RSS Feed   
Video Display Terminals Reports
 
Multiple Monitors in the Mobile World
sponsored by TechData - Samsung
WHITE PAPER: This white paper takes looks at how businesses and organizations are benefiting from investing in desktop displays in an increasingly mobile world. Learn how to design an ergonomic office that will benefit your employees and your bottom line.
Posted: 14 Sep 2017 | Published: 14 Sep 2017

TechData - Samsung

Tools of Today's Trade
sponsored by TechData - Samsung
WHITE PAPER: Access this white paper to learn how the tools of the modern workforce have evolved over the last 20 years, and find out what kind of tools your workforce needs right now, to enhance productivity.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechData - Samsung

MMD study: Increase health of deskworkers with the right IT equipment
sponsored by MMD
WHITE PAPER: The following white paper explores the benefits of how pairing your workforce with an ergonomic monitor can alleviate a large portion of pain and fatigue, ultimately increasing their well-being, happiness, and efficiency. Read on to learn more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

MMD

Desktop Monitors: It's All About the Right Connections
sponsored by TechData - Samsung
DATA SHEET: Doing business is all about making the right connections. Same applies to your laptops and computers. Access this data sheet to learn how to best connect your desktop monitors for optimal function and cost reduction.
Posted: 14 Sep 2017 | Published: 30 Jun 2017

TechData - Samsung

Desktop Monitor Overview
sponsored by TechData - Samsung
EBOOK: Desktop monitors. Everyone needs them and everyone overlooks the impact they have on the workplace until one of them stops working. Take a minute to skim this e-book and learn about the latest advances in desktop monitor technology to see how it can impact your employees' productivity.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

TechData - Samsung

Expands the workspace with one single cable
sponsored by MMD
PRODUCT OVERVIEW: Check out the following solution brief to get a firsthand look at what's new to the world of docking stations. See how with USB 3.0 you can virtually eliminate the need for excess wires, actually increase worker well-being, and more.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

MMD

iPDU Pocket Guide
sponsored by Tech Data - Panduit
PRODUCT LITERATURE: When it comes to power distribution units there are a lot of options to choose from. Download this pocket guide to PDUs for a list of different products and accessories and their benefits.
Posted: 25 Apr 2018 | Published: 25 Apr 2018

Tech Data - Panduit

Modern Infrastructure – October 2016
sponsored by SearchDataCenter.com
EZINE: This month's Modern Infrastructure e-zine examines how two abstraction technologies are being used together and how some open source innovators are even latching onto this best-of-both-worlds idea in an effort to better merge containers and VMs.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

SearchDataCenter.com

How Can Semiconductor Firms Cut Design Costs and Shorten Time-To-Market?
sponsored by IBM
RESOURCE: This resource explores the effectiveness of a set of electronic design automation (EDA) tools for semiconductor chip designers. Find out how to accelerate the delivery of high-quality processors to the market faster and more cost-effectively.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

IBM

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

October Essentials Guide on Mobile Device Security
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Best Practices for Managing and Understanding Mobile Authentication
sponsored by SearchSecurity.com
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

SearchSecurity.com

Zoom Video Conferencing for Virtual Care
sponsored by Zoom Video Communications
RESOURCE: In this white paper, learn about video conferencing technology that can provide the functionality you need for successful virtual care.
Posted: 04 Apr 2017 | Published: 30 Dec 2016

Zoom Video Communications

How Unified Communications Impacts IT Teams in 2017
sponsored by Vyopta
WHITE PAPER: Learn more about what 300+ IT, AV, network, and video conferencing specialists have to say about the changes within the unified communications industry, how these changes have affected their role, and trends to expect.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Vyopta

ResponsiveEd Expands Face-to-Face Collaboration
sponsored by Logitech Inc.
WEBCAST: Watch this webcast to discover how a new videoconferencing technology delivers center of room control that dramatically simplifies the meeting joint control experiences, allowing users to make a call, join an existing meeting, see the roster of attendees, and change the layout to full screen video – all from one single, centrally located control.
Posted: 06 Jul 2017 | Premiered: May 24, 2016

Logitech Inc.

The Collaborative Enterprise: How Enterprises Are Adapting to Support the Modern Meeting
sponsored by Logitech Inc.
WHITE PAPER: Communications technology has transcended the ability to simply enable virtual collaboration to now making it effective and desirable. This Wainhouse Research white paper examines the evolution of the workplace and the tools that are being used to collaborate.
Posted: 14 Mar 2017 | Published: 30 Jan 2015

Logitech Inc.

Extending the Skype Experience to Every Meeting Room
sponsored by Logitech Inc.
WHITE PAPER: The next generation of Skype for Business meeting room systems promises to provide users the communications tools they need to effectively collaborate and meet in any meeting room. But can you really believe these promises? This Frost & Sullivan white paper demystifies the capabilities of a new Skype for Business meeting room system.
Posted: 14 Mar 2017 | Published: 31 Jan 2017

Logitech Inc.

CW ANZ April 2018
sponsored by ComputerWeekly.com
EZINE: OpenStack's popularity has increased across the globe. A 2017 survey has revealed a 44% increase in OpenStack deployments compared to a year earlier – and 74% of all deployments occurred outside the U.S. In this issue of CW ANZ, we look at how OpenStack has changed the way Australian enterprises operate their IT infrastructure.
Posted: 12 Apr 2018 | Published: 19 Apr 2018

ComputerWeekly.com

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Mobile Configuration Management Functions for Successful MDM
sponsored by SearchSecurity.com
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

SearchSecurity.com

Six Ways to Embrace IT Consumerization
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides the definitions of IT consumerization, what it means to your organization, and offers six best ways that you can embrace it in your workplace.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

SearchSecurity.com

Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

BYOD: An Opportunity for IT Evolution
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Mobile Security Software Keeps Corporate Data Safe
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement