You've requested...

Update Your Windows: End of Support for Server 2003

If a new window did not open, click here to view this asset.

Download this next:

The state of vulnerability management

Research shows that, a full 50% of the vulnerabilities affecting older Windows platforms no longer supported by Microsoft remain unmanaged. Vulnerabilities aren’t going anywhere and present the perfect opportunity for hackers to infiltrate your operation.

In this fifth volume of the Prioritization to Prediction series, Kenna Security looks at the vulnerability risk landscape through the lens of common asset platforms, using prior findings and new data to derive some new measures unique to assets to help vulnerability management programs stay on target.

Download the report now to discover more about the state of vulnerability management.

These are also closely related to: "Update Your Windows: End of Support for Server 2003"

  • How to Get the Most out of ConfigMgr

    In this guide, learn how to implement some of the advanced features in System Center Configuration Manager to ease the transition into a more mobile world.

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    Computer Weekly – 19 June 2012: How to succeed at desktop virtualisation 

    In this week’s Computer Weekly, our latest Buyer's Guide examines the tools, technologies and best practices for success in desktop virtualisation. We ask if a six-year-old hardware technology – Trusted Platform Module - could be a key to tackling IT security threats. We look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Deloitte's CIO talks about how the global advisory firm is introducing a bring your own device (BYOD) scheme. And we look at new environmental guidelines that will help companies understand the carbon footprint of their IT. Read the issue now.

     

    Buyer's Guide to desktop virtualisation – part one: How to exploit thin-client computing

    Thin-client computing – or more accurately, server-based computing – has been around for years. We look at how the technology can help cut costs and improve flexible working while maintaining security, as part of a desktop virtualisation strategy. 

     

    Could 2012 be the year TPM security technology reaches critical mass?

    Since 2006, many new computing devices have been sold with a built-in trusted platform module (TPM) chip, but enterprises have yet to embrace the technology in their information security strategies.

     

    Fujitsu UK CEO steers private sector course in bid to cut public exposure

    Duncan Tait took the helm at Fujitsu at the height of the credit crunch and all the upheaval it triggered, but revenues and orders are on the rise again.

     

    Case study: Greenwich University centralises IT development onto single platform

    A web portal implemented by Greenwich University has enabled it to centralise administrative processes and teaching resources, allowing staff and students to access services with a single log-in.

     

    Dealing with the practicalities of the consumerisation scheme at Deloitte

    Deloitte CIO Matt Peers is embracing the benefits of a bring your own device project but says there are limits to what you can do. 

     

    Opinion: Bed down for Byte Night

    The annual IT industry charity sleep-out to raise funds to help homeless children takes place this year on 5 October. Byte Night founder Ken Deeks writes about how you can help. 

     

    The CIO role through the lens of MIT: Agile rebel or company dishwasher?

    A conference at the Massachusetts Institute of Technology highlighted the changing role of the CIO.

     

    Cutting emissions in the big picture

    New guidelines on carbon footprinting in IT were published earlier this year which, if widely adopted, could lay bare the extent of emissions beyond the boundaries of a company’s own premises.

     

    This week's digital edition is sponsored by BCS Institute, Computer Aid, Intel, RES Software, Skillsoft and Terrapin.

Find more content like what you just read:

  • IT in Europe: Next-Generation Network Management Techniques

    This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.

    Download

  • Log management best practices

    Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.

    Download

  • MicroScope - December 2017: Unlock the potential of DaaS

    This month's MicroScope ezine looks at the issues around device as a service (DaaS), the outlook from HP and a report from the UK CompTIA conference.

    Download

  • Exchange Migration E-Book Chapter 2: Mastering the Art of Migration Documentation

    This sample chapter explains how to draft a useful migration document and outlines key points your Exchange Server upgrade document should include, such as management strategies, storage design, software compatibility and more.

    Download

  • A Computer Weekly buyer's guide to networks

    Computer Weekly looks at an increasingly complex networking environment and offers advice for IT leaders on managing it in this 10 page Buyer's Guide.

    Download

  • Web Browser Security Features Make Attacks Harder

    This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.

    Download

  • Technical Guide on SIM: Moving beyond network security toward protecting applications

    SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.

    Download

  • Quocirca: Selecting a cloud printing platform

    As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.

    Download

  • Advanced Virtualization E-Book: Chapter 7 - Network Virtualization: Unifying the Data Center

    We are potentially at the beginning of a new generation of IT administrators who manage a range of technologies outside of the traditional realm of virtualization. Read this E-Book to learn more.

    Download

  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres

    Download

  • Expert Best Practices: Using Linux for Data Center Consolidation

    Access this expert e-guide for the top advantages of using Linux in a data center consolidation project. Learn how using Linux can help you more effectively reduce cooling costs, reduce real estate footprint and improve server workload utilization.

    Download

  • Case study: Taking network access control to the cloud

    For AbsoluteCare, a regional healthcare provider on the east coast, HITRUST certification was becoming a must. As part of their journey towards HITRUST, the need to implement a network access control solution (NAC). Read this case study to discover how they decided on Portnox for their NAC requirements.

    Download

  • Computer Weekly storage case studies

    Antony Adshead takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • IT in Europe E-Zine – The Cloud Issue

    There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.

    Download

  • Step-by-step Guide to Virtual Infrastructure Management

    Though monitoring and managing your virtual infrastructures can be challenging, the right tools and strategies can help you maintain control over your environment. Access this e-guide to gain key tips and best practices for monitoring applications, physical host servers, hypervisors and more.

    Download

  • Private Cloud E-Zine Vol. 4

    As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.

    Download

  • Essential Guide to Software Defined Networks

    Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.

    Download

  • Mobile Device Security Overview

    This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.

    Download

  • Allocating and Configuring Storage for Virtual Machines

    This drill-down on allocating and configuring virtual machine storage provides storage admins with some best practices to configure virtual machine storage in their virtualized data centers. Read on to learn more.

    Download

  • A Computer Weekly Buyer's Guide to Converged Infrastructure

    In this 13-page buyer's guide, Computer Weekly looks at how the technology cuts the numbers of discrete skills and associated costs while demanding that those who remain retrain to ensure they know how to manage all parts of the stack – and the organisation implements it with care and an understanding of the risks.

    Download

  • Computer Weekly - 8 February 2022: Exploring the metaverse

    In this week's Computer Weekly, the metaverse is set to become a highly competitive commercial playground –profitable markets but also high-profile failures will follow. IT contractors have been hit by cyber attacks on the firms that pay their wages – we examine the impact. And we ask if it's time to plan for quantum computing. Read the issue now.

    Download

  • Unix-to-Linux Migration

    Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.

    Download

  • Step-by-step Guide to Migrating from Exchange 2003 to Exchange 2010

    While Exchange 2010 promises to offer enhanced communication and collaboration capabilities, the migration process can still be a challenge for even the most diligent IT professional. Take a look at this e-book from the editors at SearchExchange.com for a top-to-bottom, expert analysis of the Exchange migration process.

    Download

  • Top 10 end-user computing stories of 2019

    IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • Has HP taken a calculated risk in splitting the business?

    Hewlett Packard (HP) is planning to turn its consumer computing and printing departments into a separate company. The remaining business would comprise HP's software, business servers and IT services operations.

    Download

  • CW Buyer's Guide: Software-defined networking

    Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business.

    Download

  • Strategic Device Services: A Foundation for Transformation

    Key challenges for device management include delivering positive employee experiences, managing through inefficiencies in the device lifecycle and recovering IT costs. Insight’s strategic device services can provide relief to the labor-intensive process of device management — read the e-book to learn how.

    Download

  • Unix-to-Linux Migrations Handbook

    This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.

    Download

  • Unix to Linux Migration Implementation Tips

    Access this essential e-guide from our editors to discover how migrating from Unix to Linux platform can increase flexibility while reducing overall licensing costs. Also, get implementation tips for porting, upgrading and testing applications for optimal stability and performance.

    Download

  • The Best Storage for Virtual Environments

    Access this eGuide now to discover what vendors are doing to address the problem of IT pros struggling to support storage for virtual environments and which storage works the best in virtual infrastructures.

    Download

  • Expert Strategies for Making a Unix-to-Linux Business Case

    Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux.

    Download

  • Virtual Data Center E-Zine Volume 37: Maximizing Virtual Data Center Consolidation

    Virtualization may be well underway, but it doesn't mean new challenges won't arise as you continue to navigate your initiative. This expert e-zine offers detailed guidance for achieving the right balance in your virtual data center and presents key findings concerning your peers' consolidation objectives for 2012.

    Download

  • Exploring new web browser security capabilities

    New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.

    Download

  • Upgrade or replace? A guide to server decisions

    Server choice is one of the most impactful hardware decisions that an enterprise can make – which is why it's crucial that the needs of the applications and workloads it powers are thoroughly considered. In this guide from industry analysts, learn how to formulate your server strategy based on the needs of your enterprise.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • The technological evolution of IT industry leaders: Part two

    Companies leading the technological evolution have gone through changes. This second part of this e-guide explores the technological evolution of SAP, Microsoft and some business analytics vendors throughout the past two decades.

    Download

  • The Gorilla Guide to Backup & Recovery Best Practices

    Check out this e-book for backup & recovery best practices including why traditional backup/DR could be failing you, how to fight the scourge of ransomware, and what it takes to stay one step ahead of the bad guys.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • Strategies for Building a Private Cloud

    While the cloud can offer many benefits, IT professionals are still hesitant to transition their computing environments with all the complexities involved. This expert e-zine discusses current cloud trends, the benefits of taking the plunge, and tools you can leverage to ease the extensive process so you don’t have to lag behind.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • Unlocking the circular economy in the print industry

    There is a significant opportunity for organisations to gain economic and environmental benefits through operating a more efficient print environment, this report from analyst Quocirca reveals.

    Download

  • Computer Weekly – 5 June 2018: The bumpy ride to digital transformation

    In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download