Software  >   Systems Software  >  

Application Platforms

RSS Feed    Add to Google    Add to My Yahoo!
Application PlatformsReports
 
Optimising Linux on System z
sponsored by ComputerWeekly.com
ANALYST REPORT: Linux on System z has opened up new opportunities for the mainframe say analysts Clive Longbottom and Rob Bamforth.
Posted: 12 Oct 2012 | Published: 12 Oct 2012

ComputerWeekly.com

Expert Best Practices: Using Linux for Data Center Consolidation
sponsored by SearchDataCenter.com
EGUIDE: Access this expert e-guide for the top advantages of using Linux in a data center consolidation project. Learn how using Linux can help you more effectively reduce cooling costs, reduce real estate footprint and improve server workload utilization.
Posted: 10 Oct 2012 | Published: 10 Oct 2012

SearchDataCenter.com

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Windows 7 Migrations and Beyond: Ensuring Successful OS Migrations while Boosting Productivity and Simplifying Management
sponsored by RES Software
WHITE PAPER: This white paper describes common Windows 7 migration paths and the challenges associated with them. Find out how you can successfully manage the user experience and avoid time-consuming issues as you navigate your transition.
Posted: 01 Aug 2012 | Published: 01 May 2012

RES Software

Secunia PSI Country Report - Q4 2013 Germany
sponsored by Secunia
WHITE PAPER: This informative report explores the current state of cybercrime targeting German PCs and what can be done to stop them.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Secunia

Deep Defender Blogs
sponsored by Intel
SOFTWARE DOWNLOAD: Find out why protecting your operating system no longer serves as enough security to keep your business safe. By downloading this software, you can see the results of stopping stealth attacks with endpoint security that goes beyond the operating system.
Posted: 03 Oct 2012 | Premiered: 03 Oct 2012

Intel

E-Guide: Best Practices for Installing Windows 8 on Your Laptop
sponsored by Dell, Inc. and Microsoft
EGUIDE: This e-guide takes a first look at Windows 8 features and discusses best practice for installing this OS upgrade. Discover how to streamline deployment for your laptops and review the security and user interface enhancements of this latest Microsoft OS.
Posted: 13 Nov 2012 | Published: 13 Nov 2012

Dell, Inc. and Microsoft

Linux in the Mainstream: Highlighting Customers Running Their Business on Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This IDC White Paper presents three case studies of customers that are using Linux for large deployment, business-critical applications.
Posted: 11 Dec 2013 | Published: 31 Jan 2013

Red Hat

Microsoft Roadmap Chapter 5: Windows Server 2012 and Its Hardware Requirements
sponsored by Dell and Microsoft
EBOOK: Upgrading to Windows Server 2012? Learn what hardware you'll need to ensure compatibility.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Dell and Microsoft

Lab Report: NetApp Clustered Data ONTAP with Oracle Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Validation report documents the results of hands-on testing of NetApp clustered Data ONTAP in Oracle database environments, with a focus on ease of management, non-disruptive operations, and efficient scaling.
Posted: 01 Jul 2013 | Published: 31 Jan 2013

NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement