Search Computerworld UK

Search Computerworld UK website for

Found 4648 results for 'laptop'. Time taken 93ms


Order results by relevancy / date

Voice: The lost piece of the BYOD puzzle

Everyone already knows the benefits that BYOD offers to their organisation, giving the workforce the simplicity and freedom to choose how they want to communicate and access data. But, whilst many BYOD strategies have been tried and tested to deliver best results, a key area tends to get overlooked: Voice, and how to easily split business and personal use. Download this White Paper to find out if you’re missing a piece of the BYOD puzzle and how you can fit it into place. to a laptop computer, and much less a desktop, so you are happy to use the kit that your company…
More Like This

Achieve business continuity and keep people productive with remote access

Business continuity planning is essential to keep people productive during planned or unplanned disruptions and protect the business from consequences such as financial losses, damaged reputation, weakened customer and partner relationships and lost productivity. A complete business continuity plan must encompass both datacentre and workforce recovery, with technologies and best practices to ensure seamless operations no matter what happens. Download this whitepaper for an approach to business continuity based on flexwork, mobility and remote access that keeps both the workforce and the apps and data they depend on up and running. Windows and Mac desktops and laptops, iOS, Android and Windows-based mobile products, Google Chromebooks… Cerner applications on a laptop with a cell phone acting as a network hotspot, and the speed was the same…
More Like This

4 VMware technologies that deliver operational efficiencies and improve working practices

Users expect to have access to applications, data and information, whenever they want, wherever they are. Especially, as this is how they operate in their personal lives – seamlessly moving between devices and accessing applications they desire on demand. Consequently when they arrive at work they expect the same kind of mobile friendly functionality, adding incredible demand to your infrastructure and security. Download this white paper to explore the 4 key technologies that can help your organisation deliver greater operational efficiencies and ultimately improve working practices. their personal lives, seamlessly moving between smartphones, tablet and laptops and accessing… from their laptops, desktops and mobile devices. Spherica: Opinion White Paper 2. VMware Workspace… mobile workers will normally be working with laptops and for the foreseeable future will continue to do…
More Like This

2-in-1s: Top 5 laptop hybrids fighting their way into the enterprise

After three years on the market, devices that can switch between laptop and tablet mode are gaining… The idea of a laptop tablet hybrid led to some rolling of eyes back in 2012 – Apple’s… from a grand, Lenovo’s latest Yoga device is placed firmly at the higher end of the hybrid laptop
More Like This

Laptops, tablets and smartwatches: The evolution of mobile computing

calculators, "laptops" that weighed nearly two stone, digital organisers and even a few older Apple inventions… back for easy carrying. 1982: Grid Compass 1100 clamshell laptop Milestone: Considered the first… clamshell laptopLegacy: The Grid Compass changed portable computing forever when the manufacturer came up…
More Like This

Top five data issues for 2015

2015 is set to be a year of real change in the data environment as new legislation, technology and modern office trends combine to provide Chief Information Officers, office managers and HR directors with a very modern headache. Download this whitepaper for five key areas every organisation should take into account when embracing significant challenges and opportunities in the coming year. end of the year. This is a growing concern as employees also take tablets, laptops and USB drives to… laptops. 6 5. Data proliferation TOP FIVE DATA ISSUES FOR 2015 With the digital universe currently…
More Like This

Why 2015 is set to be a record year for data breaches – and how to prepare

When it comes to the number of data breaches and how much they cost, the trend is only going one way in 2015: and that’s up. We can be pretty certain that 2014 was a record year for high-profile breaches and that 2015 will beat it, especially with the EU General Data Regulation on the horizon. Download this whitepaper for preparation on what lies ahead in data breaches. devices such as computers, laptops and USBs should not only be 'wiped' - there is now a fear in the market… placed on all devices including mobile devices, back-up tapes and laptops. Information management has…
More Like This

Visibility Into Data Center Security and Operations Management

VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualised environments. Today, most organizations are highly virtualised on VMware, and this has produced significant savings. Download this whitepaper to find out how VMware and Trend Micro are committed to creating solutions that optimize security, manageability, and business continuity, while allowing IT to meet service level agreements (SLAs). security events being triggered, laptop lfabro: Intrusion Prevention Event Count ± 9 ± ? * x Aug 19…
More Like This

Advanced Threat Protection for Patient Health Information

Navicent Health operates a designated Level I Trauma Center and one of 42 twice designated Magnet® hospitals for nursing excellence nationwide. It provides a broad range of community-based, outpatient diagnostic and primary care; extensive home health and hospice care; and comprehensive cancer and rehabilitation services. Download this whitepaper to find out how Navicent Health were assisted in accessing their end-to-end security, including security for their networked medical devices. Health, the already serious risk of targeted threats s compounded. Besides laptops, notebook computers…
More Like This

Gulftainer IT Safe Guarded with Trend Micro Enterprise Suite

UAE based company Gulftainer is the largest privately owned, terminal operator in the Middle East. Its international presence spans over three continents including the Middle East and the Americas. For more than 38 years, Gulftainer has been delivering world-class performance to its customers, continually striving for a faster turnaround of cargo, trade and fortunes for promising new economies. Download this whitepaper to find out how Gulftainer standardized and centralized their IT security solutions. physical desktops and laptops across the UAE and Irag offices, delivering "eal-time protection against…
More Like This

Ovum Decision Matrix

Organisations are being targeted by ever more advanced and persistent malware, which continues to raise threat levels and increases the requirement for better endpoint/mobile device protection. Download this whitepaper for an analysis regarding selecting a mobile security solution. -owned and personal - known as "bring your own device" (BYOD). PCs, laptops, servers, tablets, and… /mobile security. Organizations need to know about all the servers, PCs, laptops, tablets, smartphones, and other… includes vendors that have the capabilities to provide user and device protection for PCs, laptops, tablets…
More Like This

Best of the enterprise women in IT: Meet the everywoman in Technology Awards finalists

National Grid make financial savings through improvement projects, such as the provisioning of laptops for…
More Like This

The Data Centre impact of cloud, analytics, mobile, social and security

The consumerisation of IT continues to have a major impact on business. Technology forces have emerged that are challenging organisations ability to respond. Cloud computing, mobility, social business, big data and analytics and IT security technologies are evolving rapidly, putting organisation’s agility to the test. Download this white paper to gain an understanding to how your data centres agility could be getting impacted by rapidly changing technologies. real. Employee-owned smartphones, tablets and laptops used for both business and personal applications…
More Like This

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

The number and variety of apps that are being adopted by organizations – from on premise to cloud-based and software as a service (SaaS) to mobile apps – is rapidly expanding and increasing. Identity-as-a-Service (IDaaS) is an emerging solution category for managing and simplifying access to apps, but there are a number of feature, architecture and maturity considerations when selecting an IDaaS. Download this whitepaper to discover six of the top considerations. and devices, and is integrated across all of device platforms (laptops, smartphones, tablets). With… —desktops, laptops and mobile devices. In a properly architected system, once users authenticate by logging in with…
More Like This

Lenovo hit with lawsuit over Superfish

Lenovo admitted to pre-loading the Superfish adware on some consumer PCs, and unhappy customers are now dragging the company to court on the matter. laptops… Jessica Bennett said her laptop was damaged as a result of Superfish, which was called "spyware" in court… consumer PCs. The laptops affected by Superfish include non-ThinkPad models such as G Series, U Series, Y…
More Like This



We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message