Software  >   Systems Software  >  

OS

RSS Feed    Add to Google    Add to My Yahoo!
OS Reports
 
Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Plugging into Zero Clients Powers Investment Program
sponsored by Dell, Inc. and IntelĀ®
CASE STUDY: Access this white paper to discover how a VDI solution enabled improvement of the desktop environment by centralizing data to tighten security and decrease desktop management.
Posted: 11 Nov 2014 | Published: 31 Oct 2014

Dell, Inc. and IntelĀ®

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper describes endpoint backup's role in e-discovery, including the data collection and preservation capabilities it offers.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Code42

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Lab Report: NetApp Clustered Data ONTAP with Oracle Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Validation report documents the results of hands-on testing of NetApp clustered Data ONTAP in Oracle database environments, with a focus on ease of management, non-disruptive operations, and efficient scaling.
Posted: 01 Jul 2013 | Published: 31 Jan 2013

NetApp

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Eguide: How to Handle Legacy Apps in a Windows 8 Migration
sponsored by Microsoft
EGUIDE: This expert guide explores how to handle legacy applications when migrating to Windows 8. Read on to learn how to avoid the uncertainty and compatibility issues that these applications can cause.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Microsoft

It's Not Too Soon to Think About Windows Licensing
sponsored by Dell, Inc. and Microsoft
EGUIDE: While you may not be ready to hop on the Windows 8 bandwagon quite yet, it's never too early to start the planning process. This expert E-guide from SearchConsumerization.com provides the best strategies for upgrading your operating systems and explores the benefits it can provide your organization.
Posted: 13 Nov 2012 | Published: 13 Nov 2012

Dell, Inc. and Microsoft

Enterprise Mobility Management E-Book Part 3
sponsored by SearchMobileComputing
EBOOK: Part 3 of this Enterprise Mobility Management e-book deciphers how to benefit from mobile app management (MAM). From third-party MAM to OS-enabled MAM, learn why there will be situations that call for a particular method.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SearchMobileComputing
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
OS White Papers | OS Multimedia | OS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement