Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Disk Operating System Reports
 
Threat Analysis: Understanding and Combating DDoS Attacks
sponsored by Dell SecureWorks
WHITE PAPER: This analysis focuses on the types of attacks generally referred to as distributed denial-of-service, or DDoS, attacks. DDoS attacks are most often used to extort or damage businesses whose websites or online assets are a major source of revenue, are an indicator of brand value, or are critical to operations.
Posted: 31 May 2011 | Published: 31 May 2011

Dell SecureWorks

Evolving Security Technologies Present New Opportunities for Businesses
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Distributed Object Store Principles of Operation: The Case for Intelligent Storage
sponsored by Hitachi Data Systems
WHITE PAPER: This resource explores the growth of distributed object stores (DOS) and examines the underlying mechanisms that guide their use and development.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Hitachi Data Systems

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

APD Improves their Procurement Solution with a New Middleware Strategy
sponsored by Red Hat
WHITE PAPER: In this case study, you'll explore ways one custom procurement solution provider was able to help users automatically buy the most cost-effective item available. Learn now about agile development strategies and middleware that made this possible.
Posted: 05 Apr 2016 | Published: 05 Apr 2016

Red Hat

Software Delivery Self-Assessment: Where Do You Stand Among Your Peers?
sponsored by IBM
ASSESSMENT TOOL: How can you ensure optimal quality while delivering your applications faster than the competition? With just 15 questions, you can evaluate your organization's software delivery process and see where you stand relative to your peers.
Posted: 14 Apr 2016 | Published: 30 Mar 2016

IBM

Searching for the Right SaaS Service-Level Agreement
sponsored by Microsoft
EGUIDE: In this expert guide, IT leaders weigh in on important points to consider when evaluating SaaS service-level agreements, including whether or not guaranteed uptime and availability are covered.
Posted: 12 May 2016 | Published: 10 May 2016

Microsoft

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: With six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Windows 10 Adoption Rates Strong Out of the Gates
sponsored by Citrix
EGUIDE: Windows 10 is already second in OS market share, behind only Windows 7. See where other OSes stack up and find out how to make the leap from Windows XP to Windows 10 in this exclusive guide from our experts at searchEnterpriseDesktop.com.
Posted: 27 May 2016 | Published: 19 May 2016

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement