Thin Client-Server Hardware Reports

Leading Insurance, Financial and Banking Services Provider Replaces Citrix with Ericom's Server Based Computing Solution
sponsored by Ericom Software
CASE STUDY: Western Financial group was facing a challenge to provide insurance brokers with remote access from the organization's core insurance application running on Windows terminal Servers, so to overcome this issue they moved on to Ericom.
Posted: 10 May 2008 | Published: 01 Jan 2007

Ericom Software

E-Guide: Thin vs. Thick Clients for VDI: Pros and Cons
sponsored by Dell Wyse
EGUIDE: Access this expert e-guide from SearchVirtualDesktop.com to compare the benefits and drawbacks of using thin client hardware or PCs running thin client software (thick clients) in your virtual desktop infrastructure. Increase your knowledge and find out which approach would best benefit your organization.
Posted: 21 Jan 2013 | Published: 21 Jan 2013

Dell Wyse

Transform with Mobile Apps
sponsored by AT&T Corp
WEBCAST: It’s time to start thinking strategically about enterprise mobile applications. Outside of a few vertical industries, IT isn’t able to enforce a single device platform or OS. Applications are being requested for a wider range of devices, and more end-user applications are coming from outside IT.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

AT&T Corp

Thin Clients: A New Dawn, or a Setting Sun?
sponsored by Hewlett Packard Company and Intel
PRESENTATION TRANSCRIPT: This presentation transcript features industry analysts Brian Madden and Gabe Knuth as they take a deeper look into thin client computing for today’s IT environment.  Find out how this technology has evolved throughout the years and learn how it fits in a world of $300 PCs and netbooks.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Hewlett Packard Company and Intel

Presentation Transcript: Lower IT Costs Now - Roadmap for Developing a Thin-Client Strategy
sponsored by PC Connection in partnership with HP ThinClient
PRESENTATION TRANSCRIPT: This presentation transcript explores how thin client deployments can enable businesses to achieve efficiency and high-performance benefits in your infrastructure. Receive recommendations for developing your own thin-client strategies.
Posted: 14 Oct 2009 | Published: 14 Oct 2009

PC Connection in partnership with HP ThinClient

More Than Nothing, a Zero Client Simplifies the Desktop
sponsored by TechTarget Virtual Desktop
EBOOK: In this article, you'll find a detailed examination of what zero clients are, how they work, what their primary benefits might be and where their key limitations are to be found.
Posted: 28 Feb 2014 | Published: 28 Feb 2014

TechTarget Virtual Desktop

Sun Desktop Virtualization Solution
sponsored by VMware and Sun Microsystems
WHITE PAPER: In this document learn about reference architecture and a sample implementation from Sun Desktop Virtualization Solutions. This reference architecture is an overview of the key components required to deploy the solution into your enterprise infrastructure
Posted: 29 Mar 2007 | Published: 01 Apr 2006

VMware and Sun Microsystems

Choosing the Right Thin Clients for your VDI Project
sponsored by Dell
EGUIDE: Access this expert e-guide to learn what you should be looking for in a thin client to help ensure a successful VDI project. Learn how to navigate the market as well as some of the common questions that are asked concerning thin client choices to get your project going in the right direction.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

Dell

Expert Podcast: Thin-Client Options
sponsored by Dell
PODCAST: Access this podcast to listen to expert Brian Madden discuss thin-client options and details of leading offerings.
Posted: 03 Dec 2014 | Premiered: Dec 3, 2014

Dell

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by TechTarget Security
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security