Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Mac OS

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Macintosh Operating System
DEFINITION: Panther was the code name for version 10.3 of the Apple Macintosh OS X (operating system ten). The original Mac OS X release had the code name Cheetah. Mac OS X 10.1 was called Puma, Mac OS X 10.2 was called Jaguar, and Mac OS X 10.4 was called Tiger.
Mac OSReports
18 Matches
It’s Time for Enterprises to Secure Mac Computers
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.
Posted: 18 Feb 2014 | Published: 31 Dec 2013

Symantec Corporation

Macs, Malware and Security Myths
sponsored by Symantec Corporation
WEBCAST: This in-depth resource takes a look at the various threats that can harm Macs and the role of malware in these potential threats.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: Client management tools manage configurations and support system administration tasks for client devices. Desktop support organizations often use them to automate traditionally manual system administration tasks and support functions. This Magic Quadrant breaks down the pros and cons of a number of today's client management tool vendors.
Posted: 20 Jun 2013 | Published: 28 Oct 2013

IBM

How to configure Mac OS X Server
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This step by step guide shows you how to configure Max OS X Server.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

12 Questions to Ask When Choosing an AD Bridge Solution
sponsored by Dell Software
WHITE PAPER: Find out the best ways to evaluate AD bridge solutions to help ensure maximum security, compliance and productivity.
Posted: 08 Oct 2012 | Published: 31 May 2012

Dell Software

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute Software
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute Software

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Infrastructure, Interrupted: Apple in the Enterprise Redefined
sponsored by Acronis
WHITE PAPER: Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization.
Posted: 16 Feb 2012 | Published: 05 Oct 2012

Acronis

Integrating Macs with Microsoft DFS - Best Practices
sponsored by GroupLogic
WHITE PAPER: This document describes three options for integrating Macs with Microsoft DFS infrastructure.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

GroupLogic

Case Study: Online Retailer - Enable Secure Anytime, Anywhere Access
sponsored by MokaFive
CASE STUDY: Access this case study to learn how one company implemented a desktop virtualization initiative to handle increasing numbers of desktops and servers and simplify desktop management.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

MokaFive

eGuide: Hyper-V - What You Need to Know before Getting Started
sponsored by Dell and Microsoft
EGUIDE: In this E-Guide learn how Microsoft Hyper-V fits into the server virtualization landscape, with insight on exactly what Hyper-V has to offer, and analysis of how the Microsoft technology stacks up against the competition.
Posted: 22 Jun 2011 | Published: 21 Jun 2011

Dell and Microsoft

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010

CDW

Client Management Best Practices for Managing Mac Systems
sponsored by CDW
WHITE PAPER: One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data.
Posted: 15 Apr 2010 | Published: 15 Apr 2010

CDW

The Best of Both Worlds: Sharing Mac Files on Windows Servers
sponsored by GroupLogic
WHITE PAPER: This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing a Mac/Windows integration solution.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

GroupLogic

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos, Inc.

eGuide: Hyper-V - What You Need to Know before Getting Started
sponsored by Dell and Microsoft
EGUIDE: In this E-Guide learn how Microsoft Hyper-V fits into the server virtualization landscape, with insight on exactly what Hyper-V has to offer, and analysis of how the Microsoft technology stacks up against the competition.
Posted: 18 Mar 2009 | Published: 17 Dec 2008

Dell and Microsoft

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.
18 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement