Operating Environments Reports

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

Solitaire Interglobal: Comparing Virtualization Methods for Business - Executive Summary
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

Taking a Classic Brand into the Digital Age
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Hornby, the iconic model railway company that also owns Scalextric and Airfix, is moving these classic brands into the digital age. With the release of Windows 10, we ask if businesses should upgrade. And our buyer's guide looks at managing software-as-a-service (SaaS) providers. Read the issue now.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

TechTarget ComputerWeekly.com

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Red Hat Enterprise Linux Desktop Datasheet
sponsored by Red Hat
WHITE PAPER: This white paper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a big budget but still want reliable, secure desktop for their users.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by TechTarget Security
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

TechTarget Security

Enterprise Mobility Management E-Book Part 3
sponsored by TechTarget Mobile Computing
EBOOK: Part 3 of this Enterprise Mobility Management e-book deciphers how to benefit from mobile app management (MAM). From third-party MAM to OS-enabled MAM, learn why there will be situations that call for a particular method.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

TechTarget Mobile Computing

Computer Weekly – 22 April 2014: Adapting to life after Heartbleed
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?
Posted: 22 Apr 2014 | Published: 22 Apr 2014

TechTarget ComputerWeekly.com

Computer Weekly – 11 November 2014: Migrating away from Windows Server 2003
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as Microsoft prepares to end support for the popular Windows Server 2003 operating system, we assess the risks. We hear from IT leaders delivering benefits from enterprise social media use to improve staff collaboration. And we look at criticisms from Oracle users about software licensing. Read the issue now.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget ComputerWeekly.com

Eguide: How to Handle Legacy Apps in a Windows 8 Migration
sponsored by Microsoft
EGUIDE: This expert guide explores how to handle legacy applications when migrating to Windows 8. Read on to learn how to avoid the uncertainty and compatibility issues that these applications can cause.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Microsoft