Browse Definitions:

SearchEnterpriseDesktop

SearchEnterpriseDesktop.com is part of the Windows Network of sites from TechTarget, the Web's most comprehensive source of information for IT professionals architecting, deploying, managing and developing for Windows technology in the corporate environment.

View the complete archive of Enterprise Desktop and Software Management news, research and expert advice.

Go to:  SearchEnterpriseDesktop

Recently on  SearchEnterpriseDesktop

Add Custom Drivers to WinRE

If your Windows runtime needs drivers added, you'll also want to add Custom Drivers to WinRE so your recovery environment works, too.

More Highlights
Definitions
  • Microsoft Windows Deployment Image Servicing and Management (DISM)

    Microsoft Windows Deployment Image Servicing and Management is a tool IT administrators can access through the command line or PowerShell to mount and service a Windows desktop image or hard disk before deploying it to users.

  • Microsoft Cortana

    Cortana, Microsoft's virtual assistant, debuted in Windows Phone 8.1 and is included in Windows 10. Users can schedule events, set reminders, plan navigation and more with Cortana.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

Browse Enterprise Desktop Topics

Enterprise application management

The application management section of our site focuses on managing Microsoft Windows applications like Internet Explorer and Microsoft Office on desktop machines. Your users use these applications every day and as a result are subject to the many Windows security flaws that regularly affect both IE and MS Office.

Recent Definitions

  • Microsoft Office 365 suite

    Microsoft Office 365 suite is a hosted, online version of Microsoft Office software. IT administrators access it from a web-based portal to set up new user accounts, control access to features and see the status of all Office 365 services and tools.

  • Internet Explorer (IE)

    Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.

  • productivity software

    Productivity software is a category of application programs that help users produce things such as documents, databases, graphs, worksheets and presentations. Examples of productivity software include word processors, database management systems and spreadsheet applications.

Highlights

More Enterprise application management Topics

Back to Top

Microsoft Windows desktop operating systems security management

Keeping Windows desktop systems protected and secure is an ongoing battle. Learn about security management issues, including updates and alerts for Microsoft Windows Vista, XP and legacy OSes.

Recent Definitions

  • Microsoft Windows Deployment Image Servicing and Management (DISM)

    Microsoft Windows Deployment Image Servicing and Management is a tool IT administrators can access through the command line or PowerShell to mount and service a Windows desktop image or hard disk before deploying it to users.

  • remote desktop protocol (RDP)

    Remote desktop protocol (RDP) is a secure network communications protocol designed for remote management, as well as for remote access to virtual desktops, applications and an RDP terminal server.

  • Microsoft Windows Information Protection (WIP)

    Windows Information Protection is a feature built into Windows 10 that allows IT shops to control and manage business data separately from personal data on users' devices.

Highlights

More Microsoft Windows desktop operating systems security management Topics

Back to Top

Microsoft Windows hardware, including laptop and notebook reviews

Keeping up with hardware trends for your Windows desktop in the enterprise is a must-do. Read our laptop and notebook reviews, and check out articles on Windows hardware, including chips and USB drive issues.

Recent Definitions

  • external drive enclosure (disk enclosure, disk caddy, drive caddy)

    An external drive enclosure is a metal or plastic casing that holds and powers a disk drive.

  • disk analyzer

    A disk analyzer is a piece of software that checks drives for space and usage and explores files and folders visually, simplifying file cleanup and optimization.

  • Surface (Microsoft Surface tablet)

    Surface is a line of tablet computers from Microsoft. Surface tablets will have a 10.6-inch wide display and come with USB support, dual Wi-Fi antennae, a built-in kick stand and a keyboard that doubles as the tablet’s cover. 

Highlights

Back to Top

Windows desktop operating systems

Microsoft's Windows operating system is easily the dominant OS on corporate desktops and laptops. Learn how to boost the performance of Windows machines and enhance Windows OS security by reading the tips, news and expert advice in this section, which covers issues such as application management and compatibility, suites such as Office, and desktop utilities and security. Also, read about Windows desktop management best practices, deploying newer OSes such as Windows Vista and Windows 7, and migrating from legacy operating systems such as Windows XP.

Recent Definitions

  • Remote Desktop Connection Manager (RDCMan)

    Remote Desktop Connection Manager (RDCMan) is a tool for managing multiple remote desktop sessions. It creates a single location for IT administrators to organize, group and manage connections.

  • Microsoft Cortana

    Cortana, Microsoft's virtual assistant, debuted in Windows Phone 8.1 and is included in Windows 10. Users can schedule events, set reminders, plan navigation and more with Cortana.

  • Microsoft Edge Web Notes

    Microsoft Edge Web Notes is a feature in Microsoft's Edge browser that lets users draw, highlight or type directly on webpages and web apps.

Highlights

More Windows desktop operating systems Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

  • population health management (PHM)

    Population health management (PHM) is a discipline within the healthcare industry that studies and facilitates care delivery ...

  • ICD-10-PCS

    The International Classification of Diseases, 10th Revision, Procedure Coding System (ICD-10-PCS) is a U.S. cataloging system for...

  • U.S. National Library of Medicine (NLM)

    The U.S. National Library of Medicine (NLM) is the largest biomedical library in the world.

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close