ComputerWeekly.com Research Library

Powered by Bitpipe.com

Laptop ComputersResearch

  • Windows 8 Secrets

    Sponsored by: ComputerWeekly.com

    Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book.

  • Trends in Enterprise Mobility

    Sponsored by: ComputerWeekly.com

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

  • CW Special Report on HP

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.

  • Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Sponsored by: Dell Software

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

  • CW Buyer's Guide: Consumerisation

    Sponsored by: ComputerWeekly.com

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.  

  • How Micro-Electro-Mechanical systems are taking over mobile devices

    Sponsored by: ComputerWeekly.com

    In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks.

  • Top 10 BYOD Pitfalls to Avoid

    Sponsored by: BlackBerry

    This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.

  • 9 Common Mistakes to Avoid When Selecting and Deploying a mobile Solution

    Sponsored by: ClickSoftware

    This resource outlines nine common mistakes that are often made when deploying and managing a mobile initiative. Inside, find key recommendations that will help you sidestep these concerns and realize mobile success.

  • Computer Weekly – 29 January 2013: The end of the PC refresh cycle?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now.

  • Intel Laptop Processor Comparison Tool

    Sponsored by: Intel

    See how you can use this handy comparison tool to evaluate the performance, security, and manageability features and benefits of different laptop processors. Strategically choose the solution that best matches your business needs -- click through now to get started!

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: Symantec Corporation

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • Considering a BYOPC Strategy

    Sponsored by: Symantec Corporation

    Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.

  • E-Guide: Best Practices for Installing Windows 8 on Your Laptop

    Sponsored by: Dell, Inc. and Microsoft

    This e-guide takes a first look at Windows 8 features and discusses best practice for installing this OS upgrade. Discover how to streamline deployment for your laptops and review the security and user interface enhancements of this latest Microsoft OS.

  • Cloud-delivered Endpoint Security

    Sponsored by: Webroot

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • Research Report: Understand the True Cost of Data Encryption - Like Never Before

    Sponsored by: WinMagic

    World renowned Dr. Larry Ponemon, chairman of the Ponemon Institute presents the ground-breaking results of this revolutionary study on the True Cost of Data Encryption. Read this research report to learn how organisations around the world can lower the total cost of IT ownership while protecting their devices - with WinMagic data encryption.

  • Two-factor Authentication: A Tokenless Approach

    Sponsored by: PortalGuard

    Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.

  • Citrix XenClient Virtual desktops… to go

    Sponsored by: Citrix Systems, Inc.

    This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.

  • How Mobility is Changing the Video Conferencing Landscape: Industry Trends and Deployment Best Practices

    Sponsored by: LifeSize

    This paper explores the growing prominence of personal video conferencing in organizations today and offers tips and best practices for collaboration success. Uncover the latest trends, available benefits, case studies, and more!

  • Cloud-based File Management System for BlackBerry PlayBook Tablet Customers

    Sponsored by: BlackBerry

    Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.

  • Presentation Transcript: Navigating the smartphone and tablet explosion

    Sponsored by: AppSense

    This webcast transcript highlights the challenges of navigating the smartphone and tablet explosion. Discover key strategic issues that enterprise IT teams are facing and how to overcome them. Learn how your organization can more easily and securely manage its mobile devices.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: Aerohive Networks

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • Conquering Today's Bring-Your-Own-Device Challenges

    Sponsored by: Aruba Networks

    It is vital to consider the effect BYOD will have on your network before allowing it in your enterprise. In this resource discover the new networking requirements of BYOD to help you embrace it for the better of your enterprise.

  • LaRue County High School is Improving Student Engagement and Teacher Satisfaction

    Sponsored by: Dell, Inc.

    Read this case study to learn why LaRue County High School in Kentucky deployed a Dell Latitude netbook running Windows 7 to each of its 760 students and was aided by Dell Professional Learning Services, which helped the teachers bring to life a 21st-century learning environment that integrated netbooks into the curriculum on a daily basis.

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    Sponsored by: Kensington

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.