Software  >   Systems Software  >   Operating Systems  >   PC Operating Systems  >   Windows  >  

NT

RSS Feed    Add to Google    Add to My Yahoo!
NT Reports
 
Best Practices for NT to Active Directory Migration
sponsored by Dell Software
WHITE PAPER: This document provides best practices for migration from NT to Active Directory. Note that it is not a substitute for Aelita Domain Migration Wizard's User's Guide and on-line help, which contain detailed information on the tool and its options.
Posted: 01 Apr 2008 | Published: 22 Nov 2005

Dell Software

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Securely Access Business Apps and Data with BYOD
sponsored by Citrix
VIDEO: A BYOD program can lower costs and improve productivity.But how do you ensure your BYOD program can meet IT security guidelines and allow workers remote access for secure end user computing?View this video that discusses one easy-to-install platform that gives your employees secure mobile access to all your virtual applications anytime, anywhere.
Posted: 31 Aug 2016 | Premiered: 19 Aug 2016

Citrix

How to Evaluate SD-WAN, Hybrid WAN Products
sponsored by SearchNetworking.com
EBOOK: This guide helps IT professionals learn about software-defined wide area network options in order to select the best product for their enterprise.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

SearchNetworking.com

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Red Hat Enterprise Linux: Secure Identity Management
sponsored by Red Hat
PRODUCT OVERVIEW: Address the challenges of managing identities in Linux or a mixed Linux/Windows environment by centralizing management in one interface. Download this paper to take advantage of Linux's direct integration into your environment to provide host-based access control, and more.
Posted: 14 Jul 2016 | Published: 31 Dec 2014

Red Hat

Talent Management: Why It Works and Which Vendors are Leading the Way
sponsored by HRizon
EGUIDE: Explore this expert e-guide in which Yvette Cameron, Research Director at Gartner, weighs in on the leading vendors in the talent management space, and learn 5 steps to guide your selection process.
Posted: 20 Jul 2016 | Published: 15 Jul 2016

HRizon

VCE VxRack™ System 1000 Series Overview
sponsored by Dell EMC and Intel®
WHITE PAPER: This informational white paper introduces a hyper-converged infrastructure solution that with integrated compute, networking, software-defined storage and virtualization enable storage and networking functions to be decoupled and run on a common set of physical resources ultimately evolving costumer needs.
Posted: 28 Sep 2016 | Published: 01 Sep 2016

Dell EMC and Intel®

Build a Mobile App in Less Than 15 Minutes
sponsored by Red Hat
VIDEO: This video examines a platform that supports an agile approach to developing, integrating, and deploying enterprise mobile apps – whether native, hybrid, or on the web. Discover an easier, faster way to build mobile apps end-to-end with a variety of cloud deployment options.
Posted: 19 Sep 2016 | Premiered: 08 Jan 2016

Red Hat

Mobile Device Management for Windows Phone
sponsored by IBM MaaS360
DATA SHEET: If you are using Windows Phone at your business without the proper mobile device management, then you are missing out on the true benefits of workplace mobility. Access this data sheet that highlights one enterprise mobility management platform that provisions, manages and protects Windows Phone devices, apps and documents simply and efficiently.
Posted: 09 Aug 2016 | Published: 29 Feb 2016

IBM MaaS360
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
NT White Papers | NT Multimedia | NT IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement