Software  >   Systems Software  >  

Software Platforms

RSS Feed   
Software Platforms Reports
 
Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

MobileIron Web@Work: Seamless and Secure Mobile Enterprise Web Browser
sponsored by MobileIron
WHITE PAPER: Click this resource to discover an enterprise mobile browser that enables immediate, secure access to internal websites and web apps, while adhering to security practices.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

MobileIron

A Computer Weekly Buyer's Guide to Client Access
sponsored by ComputerWeekly.com
EZINE: In this 13-page buyer's guide, Computer Weekly looks at how to orchestrate the variety of devices in use, how to achieve efficient workforce mobility, and the pressure on operating systems caused by cross-platform access.
Posted: 03 Feb 2017 | Published: 17 Jan 2017

ComputerWeekly.com

Updates: The next evolution of operating systems
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

ComputerWeekly.com

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

Red Hat Enterprise Linux for SAP Solutions (S/4 HANA)
sponsored by Red Hat
WHITE PAPER: Open to learn about Red Hat Enterprise Linux, an OS built around the needs of SAP that promises high availability, smarter management capabilities, and advanced analytic and insight features to give your critical SAP systems the tools they need to thrive.
Posted: 07 Sep 2018 | Published: 31 Dec 2017

Red Hat

How to create a near-perfect Windows 10 deployment
sponsored by Citrix
EGUIDE: Windows 10 deployments can be a challenge for many IT departments. The OS comes with its fair share of issues related to storage, security, updates and more. Download this e-guide to learn tips to successfully deploy Windows 10 in your organization.
Posted: 25 Oct 2017 | Published: 20 Oct 2017

Citrix

Dell Windows 10 Thin Clients Boost Virtual Desktop Security
sponsored by Dell, Microsoft and Citrix
EGUIDE: Dell is now offering thin client devices configured with Windows 10 to enable workspaces to take advantage of the security and management features built into Windows 10. This exclusive e-guide takes a look at what sets apart thin clients with Windows 10 apart from comparable devices.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Dell, Microsoft and Citrix

The Challenge of Unified Workspaces
sponsored by Dell and Intel
EGUIDE: In this expert-guide, learn the 4 top challenges facing end-user computing today, from application updates to security. Then, explore how your IT department can address the issue of unified workspaces head-on.
Posted: 13 Feb 2018 | Published: 07 Feb 2018

Dell and Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement