Software  >   Systems Software  >  

Application Platforms

RSS Feed    Add to Google    Add to My Yahoo!
Application PlatformsReports
 
CW Buyer's Guide: Windows 8
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11 page buyer's guide looks at the implications of Windows 8 for corporate IT.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

ComputerWeekly.com

Why Do Techies Tell Me to Ping a Website?
sponsored by Global Knowledge
WHITE PAPER: This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Global Knowledge

Taking a Proactive Approach to Linux Server Patch Management
sponsored by SearchDataCenter.com
WHITE PAPER: In this white paper, discover how to take a proactive approach to Linux server patch management. Learn more about overcoming common challenges for Linux server patch management, what to patch and when, patch management in the cloud and more.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchDataCenter.com

Windows® XP Migration: Protect and Secure Critical Data
sponsored by CommVault Systems, Inc.
WHITE PAPER: This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

CommVault Systems, Inc.

Driving Operational Excellence with Business Analytics
sponsored by IBM
WHITE PAPER: View this resource to learn more about the power of business analytics. Find out how your organization can improve focus on operational excellence and customer opportunity by reading this resource now. It outlines how you can apply a broad range of analytics technologies to managing and improving the decisions of your business.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

IBM

Expert Strategies for Making a Unix-to-Linux Business Case
sponsored by SearchDataCenter.com
EGUIDE: Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchDataCenter.com

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement