Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Mac OS

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Macintosh Operating System
DEFINITION: Panther was the code name for version 10.3 of the Apple Macintosh OS X (operating system ten). The original Mac OS X release had the code name Cheetah. Mac OS X 10.1 was called Puma, Mac OS X 10.2 was called Jaguar, and Mac OS X 10.4 was called Tiger.
Mac OSReports
20 Matches
The End of Services for Mac®: Evaluating Your Replacement Options
sponsored by Acronis
WHITE PAPER: This white paper discusses options for businesses replacing Services for Macintosh®, which will no longer be supported by Microsoft®.
Posted: 17 Jul 2014 | Published: 31 Mar 2013

Acronis

Computer Weekly – 1 July 2014: Supporting Apple in the enterprise
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide takes an in-depth look at how to support Apple products in an enterprise IT infrastructure. We find out how eBay built its own Openstack private cloud. And the chief of the government's G-Cloud programme talks about changing public sector IT procurement. Read the issue now.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

Why It’s Time for Enterprises to Secure Mac Computers
sponsored by Symantec Corporation
WHITE PAPER: This guide explores the importance of protecting your Macs with endpoint security software and outlines how malware and advanced persistent threats look to infiltrate your operating systems.
Posted: 18 Feb 2014 | Published: 31 Dec 2013

Symantec Corporation

FAQ: How to Protect Macs in Your Enterprise
sponsored by Code42
WHITE PAPER: Check out this exclusive white paper to explore five frequently asked questions about how to best protect Macs in your enterprise.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

Code42

Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: Client management tools manage configurations and support system administration tasks for client devices. Desktop support organizations often use them to automate traditionally manual system administration tasks and support functions. This Magic Quadrant breaks down the pros and cons of a number of today's client management tool vendors.
Posted: 20 Jun 2013 | Published: 28 Oct 2013

IBM

How to configure Mac OS X Server
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This step by step guide shows you how to configure Max OS X Server.
Posted: 22 Mar 2013 | Published: 22 Mar 2013

ComputerWeekly.com

12 Questions to Ask When Choosing an AD Bridge Solution
sponsored by Dell Software
WHITE PAPER: This whitepaper details 12 questions you must ask when selecting an active directory solution to ensure you make the right selection.
Posted: 08 Oct 2012 | Published: 31 May 2012

Dell Software

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute Software
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute Software

ExtremeZ-IP: Could ExtremeZ-IP Help Your Business?
sponsored by Acronis
SOFTWARE DOWNLOAD: Find out if ExtremeZ-IP is right for your environment and can deliver a better experience for Mac users and your IT department.
Posted: 15 Oct 2013 | Premiered: 15 Oct 2013

Acronis

Infrastructure, Interrupted: Apple in the Enterprise Redefined
sponsored by Acronis
WHITE PAPER: Learn more about the evolution of Apple in the enterprise and how you can make shifting standards and multiple platforms work together to benefit your organization.
Posted: 16 Feb 2012 | Published: 05 Oct 2012

Acronis

Integrating Macs with Microsoft DFS - Best Practices
sponsored by GroupLogic
WHITE PAPER: This document describes three options for integrating Macs with Microsoft DFS infrastructure.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

GroupLogic

Case Study: Online Retailer - Enable Secure Anytime, Anywhere Access
sponsored by MokaFive
CASE STUDY: Access this case study to learn how one company implemented a desktop virtualization initiative to handle increasing numbers of desktops and servers and simplify desktop management.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

MokaFive

eGuide: Hyper-V - What You Need to Know before Getting Started
sponsored by Dell and Microsoft
EGUIDE: In this E-Guide learn how Microsoft Hyper-V fits into the server virtualization landscape, with insight on exactly what Hyper-V has to offer, and analysis of how the Microsoft technology stacks up against the competition.
Posted: 22 Jun 2011 | Published: 21 Jun 2011

Dell and Microsoft

Centrify Express 2010.1
sponsored by Centrify Corporation
SOFTWARE DOWNLOAD: Centrify Express is the #1 choice of IT professionals for Active Directory-based single sign-on to Linux and Mac systems.  It is a free solution with more functionality, tools, and upgrade options than alternative offerings.
Posted: 06 Aug 2010 | Premiered: 06 Aug 2010

Centrify Corporation

Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010

CDW

Client Management Best Practices for Managing Mac Systems
sponsored by CDW
WHITE PAPER: One of the greatest challenges facing any institution is the maintenance of a large number of computer systems. When properly performed, lifecycle management—from the loading dock to the recycler—maximizes your return on investment, keeps your users more productive, and protects the security of your computer systems and your enterprise data.
Posted: 15 Apr 2010 | Published: 15 Apr 2010

CDW

The Best of Both Worlds: Sharing Mac Files on Windows Servers
sponsored by GroupLogic
WHITE PAPER: This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing a Mac/Windows integration solution.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

GroupLogic

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos, Inc.

eGuide: Hyper-V - What You Need to Know before Getting Started
sponsored by Dell and Microsoft
EGUIDE: In this E-Guide learn how Microsoft Hyper-V fits into the server virtualization landscape, with insight on exactly what Hyper-V has to offer, and analysis of how the Microsoft technology stacks up against the competition.
Posted: 18 Mar 2009 | Published: 17 Dec 2008

Dell and Microsoft

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.
20 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement