ComputerWeekly.com Research Library

Powered by Bitpipe.com

Laptop Computers Research

  • Enterprise CIO Decisions: Managing the Mobile Workforce

    Sponsored by: TechTarget Security

    Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    Sponsored by: TechTarget Security

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

  • Best Practices for mobile authentication

    Sponsored by: TechTarget Security

    Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.

  • E-Guide: Best Practices to ensure secure mobile communication

    Sponsored by: TechTarget Security

    Learn more about the importance of mobile security and how you can ensure secure mobile communications in your enterprise.

  • Cloud-delivered Endpoint Security

    Sponsored by: OpenText Security Solutions

    Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  • Two-factor Authentication: A Tokenless Approach

    Sponsored by: PortalGuard

    Learn about a flexible, cost-effective and easy-to-use two-factor authentication solution that offers greater security for your organization than leveraging password authentication alone.

  • Citrix XenClient Virtual desktops… to go

    Sponsored by: Citrix Systems, Inc.

    This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.

  • Cloud-based File Management System for BlackBerry PlayBook Tablet Customers

    Sponsored by: BlackBerry

    Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.

  • Presentation Transcript: Navigating the smartphone and tablet explosion

    Sponsored by: AppSense

    This webcast transcript highlights the challenges of navigating the smartphone and tablet explosion. Discover key strategic issues that enterprise IT teams are facing and how to overcome them. Learn how your organization can more easily and securely manage its mobile devices.

  • Mobilize to Rightsize Your Network

    Sponsored by: Aruba Networks

    Uncover how rightsizing your network can help you determine where wired network capacity can be offset with more cost-effective Wi-Fi options - helping you save money, time, and space!

  • LaRue County High School is Improving Student Engagement and Teacher Satisfaction

    Sponsored by: DellEMC and Intel®

    Read this case study to learn why LaRue County High School in Kentucky deployed a Dell Latitude netbook running Windows 7 to each of its 760 students and was aided by Dell Professional Learning Services, which helped the teachers bring to life a 21st-century learning environment that integrated netbooks into the curriculum on a daily basis.

  • What You Need to Know About the Costs of Mobility  

    Sponsored by: iPass Inc.

    Control rising mobility expenses, uncover cost reduction opportunities, and improve operational efficiencies through an enterprise-defined mobility strategy. 

  • Remote Laptop Backup 101

    Sponsored by: Code42

    This expert E-Guide dives into everything laptop backup as it explores the challenges of remote laptop backup today, different remote laptop backup approaches and best practices. Read on to learn more.

  • Mobility in the Enterprise: Professional Productivity with Intel® Core™ i5 vPro™ processor

    Sponsored by: Intel

    This case study discusses the reasons why one company decided to replace their existing laptops every two years. Find out how implementing this strategy benefited both employees and end users.

  • The Case For Endpoint Data Protection

    Sponsored by: Cibecs

    Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C

  • Enterprise CIO Decisions Volume 8: Managing the Mobile Workforce

    Sponsored by: TechTarget CIO

    There are plenty of business opportunities with mobile device and mobile workforce management, but also risks—unless IT leaders plan ahead now. Inside this e-zine, gain expert insight on mobile device management issues directly from your peers.

  • Laptop Backup for Remote Workforce

    Sponsored by: Druva

    This whitepaper discusses the key concerns in remote-backup (like bandwidth and network access) and the shortcomings in existing solutions which makes employees avoid backups. Learn more by accessing this paper today.

  • The All New 2010 Intel Core vPro Processor Family and Windows 7: Your Best Choice for Business PCs

    Sponsored by: Intel

    The all new Intel® Core™ vPro™ processor family complements the new Windows® 7 operating system by building effective trusted computing and management mechanisms into the hardware. Read this paper to learn more.

  • Dell Latitude XT2 & Microsoft Windows 7: Better Together

    Sponsored by: Dell, Inc. and Microsoft Windows 7

    Principled Technologies tested a new Dell Latitude XT2 laptop, running Microsoft® Windows® 7, against the older Latitude D610 and D620, both running Microsoft® Windows XP. Read this paper for a list of key performance results detailing efficiencies gained from a new Dell Latitude XT2 laptop running Microsoft® Windows® 7.

  • Dell Latitude E4200 & Microsoft Windows 7: Better Together

    Sponsored by: Dell, Inc. and Microsoft Windows 7

    This paper details key performance results when comparing a new Dell Latitude E4200 laptop running Microsoft® Windows® 7 with an older Latitude D610 and D620, both running Microsoft® Windows XP.

  • Alfred University Case Study: Higher Returns for Higher Education

    Sponsored by: DellEMC and Intel®

    Read this case study to learn how Alfred University saved 80% on hardware, refreshing SunGard Higher Education Banner Unified Digital Campus infrastructure with Dell servers.

  • Acadia University Case Study: Giving Students an Advantage

    Sponsored by: DellEMC and Intel®

    Acadia University wanted to enable students to purchase their own laptops but needed to narrow their selection to models that would meet exacting requirements and student approval. Dell™ Latitude™ and Dell XPS™ laptops were among several models the students selected. Read this case study to learn more.

  • Citrix XenClient

    Sponsored by: Citrix

    Desktop virtualization is delivering significant benefits. User flexibility, desktop management cost reduction, and enhanced data security and access control. Now, Citrix XenClient extends all the benefits of desktop virtualization to laptop users.    

  • Intelligence that Adapts to Your Needs

    Sponsored by: Intel

    The all new 2010 Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.