Browse Definitions :
Definition

mobile workstation

A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.

High-end features include faster graphics processors, more powerful CPUs and additional memory. Because of the extra features, mobile workstations often weigh a bit more than standard laptops. However, for professionals who require such features for their work, mobile workstations can enable portability that wasn't possible in the past. A mobile workstation should enable portable 3D design, scientific computing and multimedia creation, among other possibilities.

Mobile workstations have gone through a few generations, over which they have improved performance and reduced weight. See, below, a few examples:

Dell Precision M3800

  • 15.6 inches.
  • Just over four pounds.
  • Windows 8.1 Pro.
  • Intel Quad-Core i7 processor.
  • 16GB DDR3 RAM.
  • Nvidia Quadro K1100M graphics with 2 GB of video RAM.

Hewlett-Packard's ZBook 14

  • 14 inches.
  • 3.57 pounds.
  • 1 terabyte (TB) of storage.
  • Windows 8 Pro.
  • Either the fourth-generation Intel Core i5 or i7.
  • 16GB DDR3 RAM.

Toshiba Tecra W50

  • 15.6 inches.
  • 6 pounds.
  • Windows 8 Pro.
  • Intel Quad-Core i7 processor.
  • 16GB DDR3 RAM.
  • Nvidia Quadro K2100M graphics with 2 GB of video RAM.

 

This was last updated in October 2013

Continue Reading About mobile workstation

Networking
  • ONOS (Open Network Operating System)

    Open Network Operating System (ONOS) is an OS designed to help network service providers build carrier-grade software-defined ...

  • telematics

    Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to ...

  • packet filtering

    Packet filtering is the process of passing or blocking data packets at a network interface by a firewall based on source and ...

Security
  • three-factor authentication (3FA)

    Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication ...

  • cyber espionage

    Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry out against a business or government ...

  • role-based access control (RBAC)

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...

CIO
  • project charter

    A project charter is a formal short document that states a project exists and provides project managers with written authority to...

  • leadership

    Leadership is the ability of an individual or a group of people to influence and guide followers or members of an organization, ...

  • transaction

    In computing, a transaction is a set of related tasks treated as a single action.

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • sales development representative (SDR)

    A sales development representative (SDR) is an individual who focuses on prospecting, moving and qualifying leads through the ...

  • service level indicator

    A service level indicator (SLI) is a metric that indicates what measure of performance a customer is receiving at a given time.

  • customer data platform (CDP)

    A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that ...

Close