Terminal Emulation Protocols Reports

Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Sep 2020

TechTarget ComputerWeekly.com

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

MicroScope April 2014: A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling security, and advice on the use of social media.
Posted: 11 Apr 2014 | Published: 14 Apr 2014

MicroScope

Optimize Application Performance and Security
sponsored by BlueCoat
DATA SHEET: Blue Coat ProxyClient helps deliver a headquarters work experience to all employees wherever they are. With ProxyClient, you can define which applications to accelerate and which to block based on security and bandwidth requirements.
Posted: 15 May 2009 | Published: 14 May 2009

BlueCoat

Cruise Industry Leader Carnival Australia Improves IT Productivity and Reduces IT Costs by Optimizing Satellite WAN with Silver Peak
sponsored by Silver Peak
CASE STUDY: This case study demonstrates how Carnival Australia was able to achieve necessary improvements using Silver Peak’s data center class WAN optimization appliances to optimize satellite connections and address the network-induced latency, bandwidth limitations, and packet-loss issues on the WAN.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Silver Peak

Field Service Mobility Best Practices
sponsored by NetMotion Wireless
WHITE PAPER: Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

NetMotion Wireless

A special issue covering the information security market
sponsored by MicroScope
EZINE: A special issue covering the opportunities for resellers selling big data hinfrastructure, accessories and management tools.
Posted: 03 May 2013 | Published: 07 May 2013

MicroScope

E-Book: Strategic guide to insider threat detection and breach response
sponsored by TechTarget Security
EGUIDE: Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

TechTarget Security

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software