ComputerWeekly.com Research Library

Powered by Bitpipe.com

Laptop Computers Research

  • Top 10 BYOD Pitfalls to Avoid

    Sponsored by: SearchSecurity.com

    This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.

  • Windows 8 Secrets

    Sponsored by: ComputerWeekly.com

    Download a step by step guide to installing Windows 8 from the book Windows 8 Secrets and receive a 30% discount on the full book.

  • Mobile Device Data Protection: Key Findings and Players in the Market

    Sponsored by: SearchSecurity.com

    This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

  • Trends in Enterprise Mobility

    Sponsored by: ComputerWeekly.com

    This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working.

  • CW Special Report on HP

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.

  • Enterprise mobility management: Choosing the right approach and considering costs

    Sponsored by: SearchSecurity.com

    Explore this consumerization E-Guide that examines the integration of mobile device management, mobile application management and mobile information management in creating a secure mobile enterprise. Gain advice to help you choose a best-fit mobility strategy as well as the top cost considerations in enterprise mobility and BYOD.

  • Desktop Admin for BYOD: Security Chapter

    Sponsored by: SearchSecurity.com

    The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.

  • Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD

    Sponsored by: SearchSecurity.com

    BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.

  • Considering a BYOPC Strategy

    Sponsored by: SearchSecurity.com

    Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.

  • CW Buyer's Guide: Consumerisation

    Sponsored by: ComputerWeekly.com

    This guide to consumerisation of IT condsiders what the proliferation of consumer technology in the workplace means for the IT department and how it can empower employees to boost resourcefulness and productivity.

  • Enterprise CIO Decisions: Managing the Mobile Workforce

    Sponsored by: SearchSecurity.com

    Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: SearchSecurity.com

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • How Micro-Electro-Mechanical systems are taking over mobile devices

    Sponsored by: ComputerWeekly.com

    In this report extract Juniper Research looks at the growing use of MEMS (micro-electro-mechanical systems) in mobile devices, tables, laptops and notebooks.

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    Sponsored by: SearchSecurity.com

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

  • Best Practices for mobile authentication

    Sponsored by: SearchSecurity.com

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

  • Quickly access patient data with enhanced security

    Sponsored by: Hewlett Packard Enterprise

    This whitepaper gives an overview of the HP mt40, a thin client tailored for business-needs and promises high reliability, low ownership costs, PC-like performance, faster processing power, and flexible battery options. Read on to learn more about the HP mt40, including features, specifications, support services and more.

  • Computer Weekly – 29 January 2013: The end of the PC refresh cycle?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we ask if the days of the PC refresh cycle are over, due to declining PC sales, consumer technology and virtualisation. Remote working can be a challenge – but one project manager is doing so on Mount Everest. And we kick-off our latest buyer's guide, looking at infrastructure needs for big data. Read the issue now.

  • E-Guide: Best Practices for Installing Windows 8 on Your Laptop

    Sponsored by: Dell, Inc. and Microsoft

    This e-guide takes a first look at Windows 8 features and discusses best practice for installing this OS upgrade. Discover how to streamline deployment for your laptops and review the security and user interface enhancements of this latest Microsoft OS.

  • Cloud-delivered Endpoint Security

    Sponsored by: Webroot

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • Two-factor Authentication: A Tokenless Approach

    Sponsored by: PortalGuard

    Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.

  • Citrix XenClient Virtual desktops… to go

    Sponsored by: Citrix Systems, Inc.

    This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.

  • Cloud-based File Management System for BlackBerry PlayBook Tablet Customers

    Sponsored by: BlackBerry

    Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.

  • Presentation Transcript: Navigating the smartphone and tablet explosion

    Sponsored by: AppSense

    This webcast transcript highlights the challenges of navigating the smartphone and tablet explosion. Discover key strategic issues that enterprise IT teams are facing and how to overcome them. Learn how your organization can more easily and securely manage its mobile devices.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • LaRue County High School is Improving Student Engagement and Teacher Satisfaction

    Sponsored by: DellEMC and Intel®

    Read this case study to learn why LaRue County High School in Kentucky deployed a Dell Latitude netbook running Windows 7 to each of its 760 students and was aided by Dell Professional Learning Services, which helped the teachers bring to life a 21st-century learning environment that integrated netbooks into the curriculum on a daily basis.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.