Wyse Introduces New T50 Thin Client in UK

Wyse Introduces New T50 Thin Client in UK

Wyse Technology
is introducing entry-level thin client computing in UK featuring best-in-class multimedia, performance and management capabilities.

The company claims it is making Cloud Client Computing accessible to more UK businesses with the release of the Wyse T50 that delivers excellent web, Citrix, Microsoft, and VMware VDI user experience, all through an elegant and intuitive user interface.  Suitable for all budgets and enterprises of all sizes, the Wyse T50 boasts enterprise feature set that defines a new standard for entry-level thin clients. It leverages the latest ARM v7 processor to deliver 2.5 times the performance of thin clients built on earlier architectures. Wyse also claims that the T50 is ready to use in less than 20 seconds, and makes connections to remote systems easy with its simple user interface.

With the availability of the T50, we’re changing the dynamics of the entry level thin client market in the UK. Previously this market was defined by low cost options that lacked business level performance and delivered a basic end user experience,” said Andy Gee, UK sales director, Wyse. “With the T50 we’re able to demonstrate that low cost doesn’t mean low functionality.  By delivering enterprise performance levels and capabilities in a highly affordable device, organisations of any size can take advantage of the full benefits of desktop virtualization.”

The Wyse T50 thin client also displays vibrant multimedia in VDI sessions plus local web access and Flash playback from its Chromium browser.  Other features of the Wyse T50 includes the same automatic configuration and management used in Wyse’s premium thin and zero clients, which frees enterprises from depending on manual utilities and wizards.

Thanks to Wyse T50, users can connect to two monitors for optimum viewing versatility and benefit from a bracket that doubles both as desktop feet or a VESA monitor mounting bracket.

Moreover, Wyse T50 includes fast networking with gigabit Ethernet and optional integrated B/G/N Wi-Fi, supports the RDP7 protocol and offers advanced features such as the Wyse Collaborative Processing Architecture media redirection and bitmap compression.

By Anuradha Shukla

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…