KDE Desktop Environment

KDE Desktop Environment Reports
Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

SAP on SUSE Linux Enterprise Simple Stack
sponsored by SUSE
WHITE PAPER: Because organizations depend on SAP applications to plan for the future, points of failure can have serious, long-term implications. This white paper offers detailed guidance to help you build and maintain a highly available SAP architecture based on the successful integration of SUSE Linux and x86-64 hardware.
Posted: 12 Jun 2012 | Published: 20 Dec 2011

SUSE

Red Hat Enterprise Linux OpenStack Platform Datasheet
sponsored by Red Hat
DATA SHEET: This white paper examines a Linux OpenStack Platform designed to deliver an integrated foundation to create, deploy, and scale a secure and reliable public or private OpenStack cloud.
Posted: 29 Mar 2014 | Published: 28 Mar 2014

Red Hat

Red Hat and Intel: New Horizons in Scalable Performance, Reliability, Security, and Efficiency
sponsored by Red Hat and Intel
WHITE PAPER: This whitepaper talks more about how Red Hat Enterprise Linux combined with the power of Intel Xeon processors can help IT stay above workload management and set your business on the path towards a new computing environment.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Red Hat and Intel

Presentation Transcript: Tightening Down Your Linux Security
sponsored by Trusted Computer Solutions
PRESENTATION TRANSCRIPT: Read this expert presentation transcript to learn about some of the most prevalent security risks to Linux environments today. Gain insight into network devices beyond the server system that need security protection. Discover how to tighten your Linux security and minimize long-term information risks.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

Trusted Computer Solutions

What Can Linux Do For Your Web UI and Customer Service?
sponsored by Red Hat
CASE STUDY: In this IDC ROI analysis case study, you’ll discover how Flybe, Europe’s largest regional airline, manages to keep the infrastructure that front ends the company's business-critical Web presence running smoothly and consistently.
Posted: 27 Jun 2014 | Published: 30 May 2014

Red Hat

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat

Key Considerations for Selecting a Commercial Linux Distribution for Embedded Solution Development and Management
sponsored by SUSE
RESOURCE: The embedded systems market is expected to grow 5.6% over the next six years. But what challenges and pressures do embedded system developers face? And how can application development be accelerated with Linux?
Posted: 23 Oct 2020 | Published: 11 Mar 2020

SUSE

Look at Linux, the operating system and universal platform
sponsored by IBM
WHITE PAPER: When it comes to IT, Linux is everywhere. From smart phones to powerful computer systems, this flexible operating system addresses a significant number of usage models. Read this white paper to learn more about the universal platform and discover all the computer segments that it plays a role in.
Posted: 24 Apr 2012 | Published: 13 Mar 2012

IBM

5 Ways VERDE Desktop Virtualization is the Simple, Smarter Solution
sponsored by Virtual Bridges
WHITE PAPER: This brief white paper highlights 5 reasons why one desktop virtualization solution will help your organization lower its capital expenditure (CapEx) while also significantly improving security with its two layers of authentication.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Virtual Bridges