Search Enterprise Desktop
Login Register
Informa TechTarget Explore the Network
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
  • Information Week
An Informa TechTarget Publication Explore our brands
  • Search Enterprise Desktop
    • Alternative OSes
    • Application Management
    • Desktop Management
    • Unified Endpoint Management
    • Windows OS & Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:
    • Download
  • Share this item with your network:
  • Download
Download This Issue

Access

The key to end-user computing January 2018, Vol. 2, No. 1
In This Issue
  • NewsLiquidware user experience monitoring fills gap in DaaS migration
  • NewsDell EMC VDI helps university expand application access
  • Liquidware user experience monitoring fills gap in DaaS migration

    Moving virtual desktops to the cloud is complicated. To take some of the monitoring load off, one company adopted Liquidware software, making for an award-winning initiative. Read More

  • Dell EMC VDI helps university expand application access

    Desktop virtualization is notoriously difficult. With a unique approach, the University of Arkansas put together an award-winning project using Dell EMC VDI hardware and software.Read More

Access is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.

Latest TechTarget resources
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
Search Virtual Desktop
  • How to ensure webcam functionality on remote desktops

    As distributed workforces become the norm, more employees use remote desktops. To support these workers, IT must be able to set ...

  • Configuring folder redirection works with roaming profiles

    Folder redirection helps keep user files out of roaming profiles, improving consistency and reducing profile bloat in virtual ...

  • How to address roaming profiles with GPOs

    Roaming profiles can personalize nonpersistent virtual desktops, but IT should plan GPOs, folder redirection, profile versions ...

Search Mobile Computing
  • 3 BYOD security risks and how to prevent them

    BYOD security risks now extend beyond lost phones and malware. Organizations should focus on identity, app protection, device ...

  • What can organizations do to address BYOD privacy concerns?

    BYOD privacy concerns focus on the extent of IT's access to personal devices. Clear policies, selective management, and ...

  • Understanding BYOD policy enforcement and creation

    A modern BYOD policy should balance user privacy with app, access and device controls that protect corporate data on personal ...

Search CIO
  • Is AI really cheaper than human workers?

    Enterprise AI promises cost savings, but hidden expenses often exceed projections—and sometimes surpass the salaries of workers ...

  • Weekly tech news: Musk lawsuit verdict, Anthropic acquisition, Meta layoffs and billions for quantum

    Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

Search Security
  • Verizon 2026 DBIR: 6 key takeaways for CISOs

    The 2026 DBIR -- practically required reading for CISOs -- identifies critical enterprise security trends, from exploit-driven ...

  • Identity security for AI agents: The proliferation challenge

    Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different ...

  • Taking care of business: The CISO's role in a cyber crisis

    CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close