Browse Definitions:

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is part of the Windows Network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals architecting, deploying, managing and developing for Windows technology in the corporate environment.

View the complete archive of Enterprise Desktop and Software Management news, research and expert advice.

Go to:  SearchEnterpriseDesktop

Recently on  SearchEnterpriseDesktop

End-user security requires a shift in corporate culture

It's important for everyone in a company to take security seriously, including end users. A big part of that is training.

More Highlights
  • Win10 Build 1709 Unleashed

    With the Win10 Build 1709 unleashed on 10/17/17, there's no reason for IT pros not to grab and install a copy so they can kick the tires and start thinking about migration.

  • Six Windows 10 Fall Creators Update features to know

    The Fall Creators Update is the latest major update to Windows 10. Two of the biggest changes are security enhancements and better Windows Update control.

  • Fall Creators Update Gets Simultaneous ADK

    For Windows 10, the Fall Creators Update Gets Simultaneous ADK (Windows Assessment and Deployment Kit) access when the new release goes live on October 17.

Definitions
  • Ivanti

    Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.

  • ActiveX

    ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.

  • Process Explorer

    Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.

Browse Enterprise Desktop Topics

Enterprise application management

The application management section of our site focuses on managing Microsoft Windows applications like Internet Explorer and Microsoft Office on desktop machines. Your users use these applications every day and as a result are subject to the many Windows security flaws that regularly affect both IE and MS Office.

Recent Definitions

  • ActiveX

    ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.

  • Microsoft Office 365 suite

    Microsoft Office 365 suite is a hosted, online version of Microsoft Office software. IT administrators access it from a web-based portal to set up new user accounts, control access to features and see the status of all Office 365 services and tools.

  • Internet Explorer (IE)

    Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.

Highlights

More Enterprise application management Topics

Back to Top

Microsoft Windows desktop operating systems security management

Keeping Windows desktop systems protected and secure is an ongoing battle. Learn about security management issues, including updates and alerts for Microsoft Windows Vista, XP and legacy OSes.

Recent Definitions

  • Ivanti

    Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.

  • Microsoft Windows Deployment Image Servicing and Management (DISM)

    Microsoft Windows Deployment Image Servicing and Management is a tool IT administrators can access through the command line or PowerShell to mount and service a Windows desktop image or hard disk before deploying it to users.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

Highlights

More Microsoft Windows desktop operating systems security management Topics

Back to Top

Microsoft Windows hardware, including laptop and notebook reviews

Keeping up with hardware trends for your Windows desktop in the enterprise is a must-do. Read our laptop and notebook reviews, and check out articles on Windows hardware, including chips and USB drive issues.

Recent Definitions

  • external drive enclosure (disk enclosure, disk caddy, drive caddy)

    An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.

  • disk analyzer

    A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.

  • Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover. 

Highlights

Back to Top

Windows desktop operating systems

Microsoft's Windows operating system is easily the dominant OS on corporate desktops and laptops. Learn how to boost the performance of Windows machines and enhance Windows OS security by reading the tips, news and expert advice in this section, which covers issues such as application management and compatibility, suites such as Office, and desktop utilities and security. Also, read about Windows desktop management best practices, deploying newer OSes such as Windows Vista and Windows 7, and migrating from legacy operating systems such as Windows XP.

Recent Definitions

  • Process Explorer

    Process Explorer is a free Windows task manager and system monitoring tool that details which programs in a user's system have a specific file or directory open.

  • Microsoft Windows 10 Shared PC Mode

    Windows 10 Shared PC Mode is an operating system feature that allows IT administrators to configure computers for multiple user access.

  • Microsoft Windows Assessment and Deployment Kit (Windows ADK)

    The Microsoft Windows Assessment and Deployment Kit is a set of tools IT professionals can combine to prepare, assess and launch image-based Windows deployments.

Highlights

More Windows desktop operating systems Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close