Thin Client-Server Hardware Reports

Do You Need Malware Protection on a VDI Thin Client?
sponsored by Dell, Microsoft and Citrix
EGUIDE: There are plenty of options for VDI thin client devices out there, and most are safe to use without antimalware software. But there are some thin client models that should have added malware protection. Learn which thin client needs extra protection and why.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Dell, Microsoft and Citrix

What Are The Security Benefits of Using Thin Client Devices?
sponsored by Dell, Microsoft and Citrix
EGUIDE: Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Dell, Microsoft and Citrix

Dell Cloud Client Computing empowers students, faculty at award winning school district
sponsored by Dell and VMware
CASE STUDY: This exclusive case study examines how a school district with limited resources was able to utilize a thin client solution, as part of a virtual desktop initiative, to extend better, more efficient services to users while dramatically reducing costs.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Dell and VMware

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell
WHITE PAPER: Take a look at desktop virtualization hardware solutions with dual- and quad-core options to suit your unique needs.
Posted: 14 Nov 2014 | Published: 11 Nov 2014

Dell

Children's Health Associates Reduces IT Costs and Complexities with Ericom's Server Based Computing Solution
sponsored by Ericom Software
CASE STUDY: See how Children's Health Associates, the largest private pediatric medical practice in the US, found a reliable and safe alternative to a standard Internet terminal system to achieve their IT goals.
Posted: 10 May 2008 | Published: 01 Jan 2007

Ericom Software

Dell Wyse ThinOS Thin Clients: Secure by Design
sponsored by Dell
WHITE PAPER: This whitepaper takes a look at the Dell Wyse ThinOS thin client desktops, software and hardware platforms.
Posted: 14 Nov 2014 | Published: 10 Nov 2014

Dell

Ericom Desktop Virtualization Solutions
sponsored by Ericom Software
SOFTWARE LISTING: Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others.
Posted: 20 May 2008 | Published: 01 May 2008

Ericom Software

E-Guide: Choosing the Right Thin Clients for your VDI Project
sponsored by Dell
EGUIDE: In this e-Guide from SearchVirtualDesktop.com, learn some important tips on how to choose the best thin clients and what features to look for. Also, check out the answers to commonly asked questions about thin client choices.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Dell

Manchester Essex Regional School District: Virtualization helps a Massachusetts school district deliver better education while reducing costs, IT staff burdens and environmental impact
sponsored by VMware, Inc.
WHITE PAPER: The Manchester Essex Regional School District was looking to build a new school for its 8500 student body, tasking the IT department with finding the most effective way to help build and manage an energy-efficient IT infrastructure. This white paper highlights how VMware data center virtualization and other software helped them achieve their goals.
Posted: 12 Jul 2011 | Published: 12 Jul 2011

VMware, Inc.

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by TechTarget Security
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security