|By Business Wire||
|May 27, 2014 01:20 PM EDT||
Devon IT, Inc., a leading provider of thin client and virtual desktop software solutions, today announced that it will be hosting a series of webinars for Lenovo Sales Representatives and Channel Partners. The first in this series will be held on Thursday, May 29, 2014, titled, “Selling The Lenovo Thin Client Solution to Customers.”
Lenovo ThinkCentre M73 Thin Client (source: Devon IT)
Lenovo now offers an expanded end-to-end enterprise solution portfolio with thin clients that provide enterprise level functionality at a great value for customers interested in desktop virtualization. These thin clients include Lenovo’s ThinkCentre M32 and the newly launched ThinkCentre M73 thin clients, and offer customers a choice of a flexible Linux-based thin client operating system, LeTOS or Windows Embedded Standard 7.
The Lenovo thin client also features Lenovo Thin Client Manager (LTM) software that is effective, secure and easy to use. Lenovo collaborated in partnership with Devon IT, a worldwide leader of thin client solutions to develop these advance thin client software solutions.
“Many Lenovo customer organizations expanding their desktop environments to include virtualized and server-hosted desktops or evaluating virtual desktop approaches,” explained Joe Makoid, president of Devon IT. “These webinars can help the Lenovo channel with essential information and market opportunities to any customers interested in thin client and VDI solutions.”
Lenovo Thin Client Webinar Series for Lenovo Sales and Channel
Date: Thursday, May 29th, 2014
Time: 10:30am ET or 3pm ET
Selling The Lenovo Thin Client Solution to Customers
-Thin Clients Offered by Lenovo
-Thin Client Roadmap
-Choosing an Operating System
-Managing Thin Clients with Lenovo Thin Client Manager (LTM)
-Introducing the Ceptor an HDMI Thin Client
-VDI Blaster is a Migration Tool
-The Lenovo Virtual Desktop Solution as A Whole
For information on virtual desktop hardware and software solutions or to schedule a private demonstration, email [email protected] or call (610) 757-4220 or toll-free at (888) 524-9382. For more information about Devon IT software solutions available through Lenovo including Ceptor and VDI Blaster™, please visit http://www.devonit.com/thin-client-software.
About Devon IT
Devon IT, Inc., (www.devonit.com) is a leading information technology company that offers thin client software, hardware, and virtual desktop solutions. Devon IT's products offer users in various industries and environments greater IT security, enhanced manageability, improved reliability, and lower costs. Devon IT is also the creator of patented VDI Blaster™, a software suite that transforms PCs into virtual desktops and the innovators of the SafeBook® thin client notebook. The company is headquartered in King of Prussia, Pennsylvania with offices in London, Shanghai and Bangalore. Read Devon IT's technical blog, "Thin Tank," at http://www.devonit.com/blog.
All company, brand, or product names are registered trademarks or trademarks of their respective holders.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jul. 23, 2016 05:15 AM EDT Reads: 1,079
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Jul. 23, 2016 05:00 AM EDT Reads: 1,770
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
Jul. 23, 2016 05:00 AM EDT Reads: 1,468
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Jul. 23, 2016 04:30 AM EDT Reads: 1,898
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 23, 2016 04:30 AM EDT Reads: 1,376
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jul. 23, 2016 04:00 AM EDT Reads: 2,327
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
Jul. 23, 2016 03:45 AM EDT Reads: 1,731
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Jul. 23, 2016 03:45 AM EDT Reads: 1,569
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 23, 2016 03:30 AM EDT Reads: 1,055
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Jul. 23, 2016 02:45 AM EDT Reads: 694
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jul. 23, 2016 02:45 AM EDT Reads: 2,022
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Jul. 23, 2016 02:30 AM EDT Reads: 731
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
Jul. 23, 2016 01:15 AM EDT Reads: 1,004
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Jul. 23, 2016 01:00 AM EDT Reads: 1,142
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Jul. 23, 2016 12:45 AM EDT Reads: 711