operating systems

Results 126 - 150 of 165Sort Results By: Published Date | Title | Company Name

Enterprise Readiness of Consumer Mobile Platforms

Published By: BlackBerry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management, wireless, collaboration
    
BlackBerry

Enterprise Readiness of Consumer Mobile Platforms

Published By: Blackberry     Published Date: Oct 03, 2012
An evaluation of today's four leading mobile operating systems - BlackBerry OS, Apple iOS, Windows Phone, and Google Android - revealing how they compare to each other based upon twelve categories of security and management criteria.
Tags : 
consumer mobile platforms, blackberry, mobile os, mobile operating systems, mobile security, mobile device management
    
Blackberry

Solitare Interglobal, Ltd. PowerLinux vs Windows for your SAP Deployments

Published By: IBM     Published Date: Oct 01, 2012
Using data from real customer deployments, Solitaire examines differentiators for SAP deployments on either PowerLinux or Windows. PowerLinux clearly emerges as a preferred platform.
Tags : 
sap deployment, sap, ibm, platform operating systems, business technology
    
IBM

HRG Assessment: Comparing IBM PureSystems and Cisco UCS

Published By: IBM     Published Date: Oct 01, 2012
Customers require flexible, agile and easy to consume IT solutions to succeed in business. Harvard Research Group (HRG) has taken a closer look at IBM PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, cisco, expert integrated systems, servers, storage, networking, management, security
    
IBM

Lumension Guide to Patch Management Best Practices

Published By: Lumension     Published Date: Sep 18, 2012
With the sophistication and sheer volume of exploits targeting major applications and operating systems.
Tags : 
vulnerability management, lumension, best practices, patch management, business technology
    
Lumension

Edison: Competitive Management Cost Study: IBM Storwize V7000 vs. EMC VNX5500 Storage Systems

Published By: IBM     Published Date: Jul 25, 2012
As it has been the trend over the last decade, organizations must continue to deal with growing data storage requirements with the same or less resources. The growing adoption of storage-as-a-service, business intelligence, and big data results in ever more Service Level Agreements that are difficult to fulfill without IT administrators spending ever longer hours in the data center. Many organizations now expect their capital expense growth for storage to be unstoppable, and see operating expense levers - such as purchasing storage systems that are easy to manage - as the only way to control data storage-related costs.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management, backup and recovery, ip storage
    
IBM

Why Renew? Let IBM tell you why!

Published By: IBM     Published Date: Jul 19, 2012
Cyber criminals constantly look for ways to attack systems through flaws in browsers, operating systems, and other software. Software vendors patch flaws as quickly as they can. If you don't apply their patches, you're asking for trouble. Watch htis video to learn more.
Tags : 
technology, ibm, software, subscription, renew, business management, business technology, research
    
IBM

Mobile Applications May Be Running the Business, But Who's Running the App?

Published By: SAP     Published Date: Jul 18, 2012
As mobile operations spread through your organization, how is it possible to manage, support, and configure hundreds if not thousands of mobile applications for employees who use different mobile devices and operating systems requiring different versions of the same applications? Read this white paper to discover the importance of mobile application management, and learn best practices for establishing it within your organization.
Tags : 
technology, mobile, apps, applications, business, enterprise, workplace, e-mail
    
SAP

Consolidating SAP Applications to Linux on Power by IDC

Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform, application integration, application performance management
    
IBM MidMarket Demand Generation

2011 Mobile Barcode Trend Report

Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife

Hackers don't discriminate: Viruses attack all platform users

Published By: GFI Software     Published Date: Feb 24, 2012
Regardless of whether your organization uses Windows-based PCs or Macs or a mix of both, you need a solution that provides protection for all operating systems. Read to learn more.
Tags : 
gfi software, hacker detection, security, technology, data protection, intrusion detection, authentication, identity management
    
GFI Software

Six Fairy Tales of VMware and Hyper-V Backup

Published By: Unitrends     Published Date: Dec 16, 2011
Mware host level backup works well with all deduplication strategies. In this paper we explore 6 fairy tales of VMware and Hyper-V backup.
Tags : 
vmware, hyperv, hyper-v, backup, backup and recovery, deduplication, host level, host-level
    
Unitrends

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.

Evaluating Cloud-based Mobile Device Management

Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications
    
Virtela Communications, Inc.

VMware View Optimization Guide for Windows 7

Published By: VMware     Published Date: Sep 12, 2011
This document provides guidelines for configuring a standard Windows 7 image to be used within a VMware View environment, providing administrators with the information necessary to create a standard image of Windows 7 leveraging the Microsoft Deployment Toolkit or by utilizing a script-based approach to optimize a traditionally installed Windows 7 virtual machine.
Tags : 
vmware, windows 7, microsoft, deployment toolkit, desktop infrastructure, scalability, optimization guide, target virtual machine
    
VMware

IBM Cloud tip: A basic understanding of ephemeral storage

Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Ephemeral disk storage, also known as local disk devices is an important component in using the IBM® SmartCloud. This article details the layout of the virtual disk drives available to the Linux® and WindowsT operating systems for each choice of instance size in the IBM Cloud.
Tags : 
disk, hardware, ibm corp., microsoft windows, operating systems, cloud computing, disk storace, local
    
IBM Cloud Business

Key Considerations for Selecting Endpoint Security Solutions

Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows
    
ESET

Patch Management Best Practices

Published By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : 
ibm, tivoli, application management, patch management, best practices, roi
    
IBM Tivoli

Factors to consider as you upgrade to Exchange 2010

Published By: Mimecast     Published Date: Nov 24, 2010
The requirement to upgrade servers and operating systems and maintain email during migration, means that this is one upgrade that should not be taken lightly.
Tags : 
microsoft exchange server, email migration, operating system, continuity, migration, business continuity, microsoft exchange, windows server
    
Mimecast

The Third Screen: What Email Marketers Need to Know About Mobile Rendering

Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email
    
BlueHornet

Three Mobile Email Marketing Challenges - and What You Can Do About Them

Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam
    
Unica

Tuning AIX for Oracle Part 2

Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers operating system related topics including Oracle and disk; volume groups and file systems; asynchronous and concurrent I/O; and Oracle AWR.
Tags : 
aix, mainline information systems, oracle, tuning, disk, storage management, application performance management, information management
    
Mainline Information Systems

The Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.

Common Vulnerabilities in Business IT Systems

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Read this white paper from VeriSign and RealTime Publisers to examine common vulnerabilities in IT systems and business practices that undermine information security.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks
    
VeriSign Incorp.

Ensure Mission-Critical Service Levels in VMware vSphere Environments

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Continuous, high or 'on -demand' availability — the choice is yours. The coupling of two industry-leading technologies — VMware Infrastructure 3 and Stratus ftServer systems — gives IT managers a flexible, robust solution that delivers mission-critical SLAs along with the full benefits of virtualization.
Tags : 
stratus, vmware infrastructure 3, mission-critical service levels, on-demand availability, stratus ftserver, slas, server virtualizations, operating systems
    
Stratus Technologies
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.