Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >  

Microsoft Disk Operating System

RSS Feed    Add to Google    Add to My Yahoo!
Microsoft Disk Operating SystemReports
 
The giant’s advantage: Why cloud computing levels the playing field for small businesses
sponsored by GFI Cloud
WHITE PAPER: In this white paper, you will find effective cloud computing solutions that will help your business grow—not only for technical purposes, but also with the relationship between your team.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

Detecting Zero-Day Exploits in the Wild
sponsored by Websense
WHITE PAPER: This report outlines the methodology used to research Windows Error Reporting (WER) – and explains its potential implications for your organization's cyber security.
Posted: 28 Mar 2014 | Published: 28 Mar 2014

Websense

Successful Application Security Testing for Agile Development
sponsored by Veracode, Inc.
WHITE PAPER: Find out how one leading vendor is working to provide only the best coding practices and application security testing, so businesses like you can make sure your applications are safe and secure.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

Veracode, Inc.

SQL Diagnostic Manager – Download a Free Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Uncover all the ins-and-outs of a 24/7 SQL performance monitoring, alerting and diagnostic tool – and gain access to a free trial.
Posted: 21 Jul 2014 | Premiered: 21 Jul 2014

Idera

UNIX to Linux Migration Assessment
sponsored by Red Hat
RESOURCE: Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures.
Posted: 02 Apr 2014 | Published: 31 Dec 2010

Red Hat

Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER: This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012

Pangea Systems

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Manage and Safeguard Your Business-Critical Applications
sponsored by CommVault Systems, Inc.
WHITE PAPER: This IDC White Paper evaluates the key customer requirements for protecting, managing, and accessing enterprise application data and shows how a software platform addresses these challenges by providing a comprehensive range of enterprise application data protection and recovery features in a single package.
Posted: 20 Jun 2014 | Published: 30 Sep 2013

CommVault Systems, Inc.

Secunia Vulnerability Review 2014
sponsored by Secunia
WHITE PAPER: This guide reviews vulnerabilities for 2014 and discusses key figures and facts from a global IT security perspective.
Posted: 21 Mar 2014 | Published: 26 Feb 2014

Secunia

SaaS vs. Premise-based Monitoring: 9 Reasons Why SaaS Makes More Sense
sponsored by LogicMonitor
WHITE PAPER: Access this resource for the 9 benefits of SaaS, and to find out why server and network monitoring is ideal for a cloud-based model.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

LogicMonitor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement