OS Reports

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019

TechTarget ComputerWeekly.com

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

Technology industry at the cross-roads: Transforming quote-to-cash operations
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from PwC, highlights the urgency for technology companies to reinvent their existing operating models to meet the fast-changing buying process.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget ComputerWeekly.com

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Linux in the Mainstream: Highlighting Customers Running Their Business on Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This IDC White Paper presents three case studies of customers that are using Linux for large deployment, business-critical applications.
Posted: 11 Dec 2013 | Published: 31 Jan 2013

Red Hat

Solitaire Interglobal: Comparing Virtualization Methods for Business - Executive Summary
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

TechTarget ComputerWeekly.com

Desktop management tools still an IT staple
sponsored by TechTarget Enterprise Desktop
EBOOK: Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

TechTarget Enterprise Desktop

Which Operating System is Right for your Business Needs?
sponsored by Red Hat
WHITE PAPER: This white paper talks about the challenges of migrating from Solaris 10 to Solaris 11 and highlights the benefits of migrating from Solaris to Red Hat Enterprise Linux instead.
Posted: 09 Apr 2014 | Published: 30 Dec 2011

Red Hat

How to Create a Successful Windows 10 Deployment: Tips from your Peers
sponsored by Kollective Technology, Inc.
EGUIDE: Windows 10 deployments don't always go as smoothly as planned. The OS comes with challenges related to storage, security, updates and more. However, there are plenty of ways to overcome these challenges. In this e-guide you'll learn tips from your peers on how to create a near-perfect Windows 10 deployment.
Posted: 24 May 2018 | Published: 21 May 2018

Kollective Technology, Inc.