Desktop GeneralWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Desktop General returned the following results.
RSS What is RSS?
Related Categories

 •   Desktop Management
 •   Virtualization
 •   Customer Service (General)
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   E-Mail Management
 •   Laptops/ Notebooks/ Tablet PCs
 •   Desktops/ Workstations
 •   Customer Relationship Management (CRM)
 •   Data Security

Related Searches
 •   Configure Desktop General
 •   Contract Desktop
 •   Desktop Firms
 •   Desktop General New York
 •   Desktop Lists
 •   Implementation Desktop General
 •   Organizational Desktop General
 •   Own Desktop General
 •   Procurement Desktop
 •   White Paper Desktop
Advertisement

ALL RESULTS
1 - 25 of 430 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Client Virtualization in a Cloud Environment by Intel

June 10, 2011 - (Free Research)
Client virtualization is a complex beast. This white paper highlights some of the general issues and concerns surrounding this initiative. 
(WHITE PAPER) READ ABSTRACT |

Gartner CIO briefing: The future of client computing by ComputerWeekly.com

November 02, 2010 - (Free Research)
The desktop PC has had a prominent position within organisations for over 20 years,firmly establishing it as a de facto device choice for most users. But over the past fiveyears, some key trends associated with the desktop device - and its use withinorganisations - have begun to reshape the landscape. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript:  Best Practices for Windows 7 Migration by Dell KACE

July 29, 2011 - (Free Research)
With a Windows 7 migration likely in the near future, preparation and planning are essential. Access this exclusive presentation transcript to learn some actionable best practices for the Windows 7 migration, including using clean installations, categorizing applications, and virtualizing applications and desktops. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Streaming and Virtual Hosted Desktop Study by Intel

November 21, 2008 - (Free Research)
Read this paper to learn what Intel IT found when they compared the impact on servers and the network for both streaming software and virtually hosted computing models. 
(WHITE PAPER) READ ABSTRACT |

Virtualization for your enterprise by Dell, Inc.

August 24, 2011 - (Free Research)
This paper explores the basics of a Virtual Desktop Infrastructure (VDI) deployment, including a general description of components and their purpose. Read more to discover the benefits of VDI, and how you can determine if this technology is right for your business. 
(WHITE PAPER) READ ABSTRACT |

Using Desktop Virtualization to Drive Quality and Cost Savings in Clinical Computing by Dell, Inc.

August 04, 2011 - (Free Research)
Incentives created by the American Recovery and Reinvestment Act are expected to increase EHR adoption and point-of-care computing -- meaning demands on availability and performance are high, while the budgets to manage devices are small. Find out how desktop virtualization can assist with these healthcare challenges. 
(WHITE PAPER) READ ABSTRACT |

Introducing File Area Networks First Edition Your First Look at FAN Technology by Brocade

March 2008 - (Free Research)
This book contains information about File Area Networks (FANs) in general, and specific information about FANs built with Brocade products and is also designed to be useful as a desktop reference for FAN administrators. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Three IT Questions for the Small Business Owner, Part 3 - What is IT Management and Why Should I Care? by Dell, Inc. and Microsoft

December 2009 - (Free Research)
In the third presentation transcript of this three-part Q&A series with expert Greg Shields, learn what IT Management is and why, as a small business, you need to understand and care about IT Management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Oracle Solaris ZFS by Oracle Corporation UK Ltd

August 2010 - (Free Research)
Oracle Solaris ZFS offers a dramatic advance in data management with an innovative approach to data integrity, near-zero administration, and a welcome integration of file system and volume management capabilities. Read this data sheet to learn more! 
(DATA SHEET) READ ABSTRACT |

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm by AVG Technologies USA, Inc.

March 2010 - (Free Research)
R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges. 
(CASE STUDY) READ ABSTRACT |

Top 10 Mobile Application Risks by Veracode, Inc.

May 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

LEVERAGING LIVE CHAT TO ACHIEVE HIGH FCR RATES by NTR Global

October 2011 - (Free Research)
To minimize downtime caused by technical failures and end-user problems, organizations can implement rapid resolution processes. Access this white paper to learn how you can leverage live chat to significantly improve customer support efficiency. 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Virtualization from the Datacenter to the Desktop by Microsoft

October 2008 - (Free Research)
This paper looks at the role virtualization should take in an optimized IT infrastructure, and presents a set of principles and best practices to build a comprehensive virtualization strategy for the organization. 
(WHITE PAPER)

Should Your Email Live In The Cloud? A Comparative Cost Analysis by Google

January 2009 - (Free Research)
This analyst report presents a spreadsheet cost model to help you calculate your fully loaded on premise email costs and compare it against cloud-based alternatives. 
(ANALYST REPORT) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Oracle PeopleSoft CRM Integration into the Contact Center by AMC Technology

May 2008 - (Free Research)
This technical integration brief explains how the PeopleSoft CRM application can be integrated into a contact center, including both general technical details of call center integration, as well as how to use vendor certified software from AMC. 
(WHITE PAPER) READ ABSTRACT |

Making Office 365 More Secure and Compliant by Dell Software

July 2012 - (Free Research)
This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool. 
(WHITE PAPER) READ ABSTRACT |

Best practices for a successful Exchange Server 2010 virtualization project by VMware, Inc.

May 2011 - (Free Research)
Microsoft Exchange Server is one of the most mission-critical IT services for enterprises, and can mean major headaches when mail servers are down. Learn how to select and verify a hypervisor to avoid common high availability mistakes. 
(EGUIDE) READ ABSTRACT |

CSC CloudMail for VMware Zimbra by CSC

January 2012 - (Free Research)
Moving your messaging application to the cloud can help you lower TCO and increase integration by eliminating the need to maintain an in-house email system. Learn how you can enjoy a full suite of email, calendaring, sharing and document management abilities on any desktop or operating system with a cloud-based platform. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: College of Virtualization - Lessons in Integrating Data Protection Software by Dell and VMware

March 2010 - (Free Research)
In this SearchStorage.com presentation transcript, you'll see an overview of data protection software. You'll recieve some general advice, business and technology considerations, as well as some deployment considerations and configurations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

MapXTreme Java Edition Data Sheet by Pitney Bowes Business Insight

January 2007 - (Free Research)
MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet. 
(DATA SHEET) READ ABSTRACT |

Privilege Made Simple: Privilege Identity Management (PIM) Demystified by BeyondTrust Corporation

March 2010 - (Free Research)
This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 430 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts