Wyse Introduces New T50 Thin Client in UK

Wyse Introduces New T50 Thin Client in UK

Wyse Technology
is introducing entry-level thin client computing in UK featuring best-in-class multimedia, performance and management capabilities.

The company claims it is making Cloud Client Computing accessible to more UK businesses with the release of the Wyse T50 that delivers excellent web, Citrix, Microsoft, and VMware VDI user experience, all through an elegant and intuitive user interface.  Suitable for all budgets and enterprises of all sizes, the Wyse T50 boasts enterprise feature set that defines a new standard for entry-level thin clients. It leverages the latest ARM v7 processor to deliver 2.5 times the performance of thin clients built on earlier architectures. Wyse also claims that the T50 is ready to use in less than 20 seconds, and makes connections to remote systems easy with its simple user interface.

With the availability of the T50, we’re changing the dynamics of the entry level thin client market in the UK. Previously this market was defined by low cost options that lacked business level performance and delivered a basic end user experience,” said Andy Gee, UK sales director, Wyse. “With the T50 we’re able to demonstrate that low cost doesn’t mean low functionality.  By delivering enterprise performance levels and capabilities in a highly affordable device, organisations of any size can take advantage of the full benefits of desktop virtualization.”

The Wyse T50 thin client also displays vibrant multimedia in VDI sessions plus local web access and Flash playback from its Chromium browser.  Other features of the Wyse T50 includes the same automatic configuration and management used in Wyse’s premium thin and zero clients, which frees enterprises from depending on manual utilities and wizards.

Thanks to Wyse T50, users can connect to two monitors for optimum viewing versatility and benefit from a bracket that doubles both as desktop feet or a VESA monitor mounting bracket.

Moreover, Wyse T50 includes fast networking with gigabit Ethernet and optional integrated B/G/N Wi-Fi, supports the RDP7 protocol and offers advanced features such as the Wyse Collaborative Processing Architecture media redirection and bitmap compression.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…