Search Enterprise Desktop
Login Register
Informa TechTarget Explore the Network
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
  • Information Week
An Informa TechTarget Publication Explore our brands
  • Search Enterprise Desktop
    • Alternative OSes
    • Application Management
    • Desktop Management
    • Unified Endpoint Management
    • Windows OS & Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:
    • Download
  • Share this item with your network:
  • Download
Download This Issue

Access

The key to end-user computing January 2018, Vol. 2, No. 1
In This Issue
  • NewsLiquidware user experience monitoring fills gap in DaaS migration
  • NewsDell EMC VDI helps university expand application access
  • Liquidware user experience monitoring fills gap in DaaS migration

    Moving virtual desktops to the cloud is complicated. To take some of the monitoring load off, one company adopted Liquidware software, making for an award-winning initiative. Read More

  • Dell EMC VDI helps university expand application access

    Desktop virtualization is notoriously difficult. With a unique approach, the University of Arkansas put together an award-winning project using Dell EMC VDI hardware and software.Read More

Access is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.

Latest TechTarget resources
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
Search Virtual Desktop
  • 6 steps for when remote desktop credentials are not working

    When remote desktop credentials fail, admins should verify account format, cached credentials, lockout status, access permissions...

  • What to do when a PC can't run Windows 11 on Hyper-V

    Windows 11 VMs can fail to install in Hyper‑V unless administrators configure Secure Boot, TPM and proper resources. Planning the...

  • How to fix a remote desktop microphone that's not working

    Hybrid work still creates audio problems for remote users. Learn how to troubleshoot a remote desktop microphone that is not ...

Search Mobile Computing
  • How to restore a deleted Android work profile

    If a user deletes an Android work profile or moves to a new phone, IT usually needs to reenroll the device. Here's how to restore...

  • How to fix an iPhone Personal Hotspot that's not working

    Hotspot issues can disrupt remote work and IT support. Here are the key fixes for connectivity, settings, carrier access and ...

  • How to troubleshoot when a hotspot is not working on Android

    Android hotspots can fail because of carrier limits, settings conflicts, weak signal or security controls. Here are the quickest ...

Search CIO
  • Failure is an option as an IT leadership tool

    In this Q&A, Gartner analyst Rob O'Donohue argues that CIOs should document failures alongside successes in a "failure resume" to...

  • 5 agentic AI case studies for CIOs

    Agentic AI can help organizations automate complex workflows. Explore real stories of what worked, what didn't and what ...

  • Weekly news roundup: Claude Mythos concerns, Muse Spark debut and U.S. infrastructure disruption

    Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

Search Security
  • News brief: Iranian cyberattacks target U.S. water, energy

    Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.

  • Human vs. AI: Debates shape RSAC 2026 cybersecurity trends

    As AI dominated RSAC 2026, CISOs and industry leaders debated its role in security, from agentic applications to the challenges ...

  • CISO checklist: Cybersecurity platform or marketing ploy?

    The cybersecurity market is booming with countless vendors claiming to offer unified platforms. Here's how to separate the real ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close