operating system

Results 276 - 300 of 336Sort Results By: Published Date | Title | Company Name

VMware View Optimization Guide for Windows 7

Published By: VMware     Published Date: Sep 12, 2011
This document provides guidelines for configuring a standard Windows 7 image to be used within a VMware View environment, providing administrators with the information necessary to create a standard image of Windows 7 leveraging the Microsoft Deployment Toolkit or by utilizing a script-based approach to optimize a traditionally installed Windows 7 virtual machine.
Tags : 
vmware, windows 7, microsoft, deployment toolkit, desktop infrastructure, scalability, optimization guide, target virtual machine, installation method, operating systems customization, network attached storage, storage area networks, storage management, windows, data quality, project management, desktop management
    
VMware

Driving Success: The Incredible Power of Company-Wide Goal Alignment

Published By: SuccessFactors, Inc.     Published Date: Aug 30, 2011
To survive in today's marketplace, small to mid-sized businesses are increasingly using the power of company-wide goal alignment to generate strong financial performance, increase productivity and create a more cohesive culture than their larger competitors.
Tags : 
successfactors, goal alignment, smbs, cohesive culture, operating margins, company strategy execution, employee turnover reduction, effective goals, s.m.a.r.t. goals, cascading goals, goal performance, real-time coaching, employee feedback, automated performance review system, return on investment, employee performance, productivity, financial management, employee monitoring software, employee performance management
    
SuccessFactors, Inc.

IBM Cloud tip: A basic understanding of ephemeral storage

Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Ephemeral disk storage, also known as local disk devices is an important component in using the IBM® SmartCloud. This article details the layout of the virtual disk drives available to the Linux® and WindowsT operating systems for each choice of instance size in the IBM Cloud.
Tags : 
disk, hardware, ibm corp., microsoft windows, operating systems, cloud computing, disk storace, local, backup and recovery, blade servers, storage area networks, storage management, storage virtualization, virtualization
    
IBM Cloud Business

Disk vs. Tape Backup

Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Save time, money, and storage space with ShadowProtect® disk-based backup and disaster recovery software - backup everything and recover anywhere
Tags : 
shadowprotect, storagecraft, storage, backup, disk-based, tape, operating system, windows, running in minutes, save time, recovery, protection, information, it administrators, backup and recovery, disaster recovery, data protection, virtualization, infrastructure
    
StorageCraft® Technology Corporation

Migrating to Windows 7 with VMware View

Published By: VMware     Published Date: May 20, 2011
This paper sets out the issues and explores the options - while providing a clear business case for moving forward with a virtualized desktop environment.
Tags : 
vmware, windows 7, migration, windows xp, virtualized desktop environment, microsoft, operating system, virtualization, windows, windows server
    
VMware

The Virtualization Imperative For Client Operating System Migrations

Published By: VMware     Published Date: May 20, 2011
The report highlights the key considerations associated with simplifying application deployments through application virtualization and automating desktop provisioning and management through desktop virtualization.
Tags : 
vmware, desktop virtualization, operating system, migration, forrester consulting, automation, business process automation, virtualization
    
VMware

Automating IT Data Collection and Compliance for GRCM Controls

Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas, access control, compliance, network security appliance, security management, risk management, data protection, database security, software compliance, vulnerability management
    
Qualys

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft, anti spam, anti spyware, anti virus, risk management
    
Lumension

Why Managing Mobility Matters

Published By: SAP     Published Date: Feb 10, 2011
The recession notwithstanding, mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Tags : 
sap, mobility, competitive edge, mobile workers, enterprise mobility, mobile, applications, iphone, crm, erp, mobile landscape, mobile computing, mobile data systems
    
SAP

Webinar: Red Hat Enterprise Linux: Your Operating System for the Cloud

Published By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility, security management, enterprise software, linux, linux certification
    
Red Hat

Database Activity Monitoring and SIEM: Working Together for Effective Compliance

Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security, auditing, security management, business activity monitoring, database development, database security
    
NetIQ

Shavlik Any-Patch, Anywhere Solutions Cover All These Products.

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
View this white paper to get a complete list of products that Shavlik covers.
Tags : 
shavlik, 3rd party application, custom patching, microsoft operating system, wsus, adobe, apple, infrastructure, interoperability, network management, network security, servers, patch management
    
Shavlik Technologies

Patch Management Best Practices

Published By: IBM Tivoli     Published Date: Dec 13, 2010
Application exploits are on the rise. And yet industry experts are reporting that most organizations are still not adequately keeping up with security patches for their operating systems, much less their applications. One of the most effective ways to protect against application exploits is to implement security patches within 48 hours of release across your entire organization. Sound impossible?
Tags : 
ibm, tivoli, application management, patch management, best practices, roi
    
IBM Tivoli

Factors to consider as you upgrade to Exchange 2010

Published By: Mimecast     Published Date: Nov 24, 2010
The requirement to upgrade servers and operating systems and maintain email during migration, means that this is one upgrade that should not be taken lightly.
Tags : 
microsoft exchange server, email migration, operating system, continuity, migration, business continuity, microsoft exchange, windows server, email archiving
    
Mimecast

Four Steps to Cure Your Patch Management Headache

Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment, application security, risk management
    
Lumension

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
    
Lumension

SME Clear Value Interactive Guided Tour (ITour)

Published By: SAP     Published Date: Jul 29, 2010
SME Clear Value Interactive Guided Tour (ITour) explains the value of the SAP SME portfolio through three value scenarios: Insight, Efficiency and Flexibility
Tags : 
sap, sme itour, smb, operating system, financial management, crm, customer relationship management, reporting, application integration, business integration, business management, customer interaction service, customer satisfaction, customer service, return on investment
    
SAP

Red Hat Enterprise Linux: A higher value and lower cost alternative to Microsoft Windows Server 2008

Published By: Red Hat     Published Date: Jul 14, 2010
Real uses prove that Red Hat Enterprise Linux has lower costs than Microsoft Windows Server 2008, improving as you scale up. It offers more efficient management costs and better flexibility and is the most tested, secure OS backed by global support.
Tags : 
red hat, enterprise linux, microsoft windows server 2008, roi, deployment, building computing, lifecycle, tco, operating system, enterprise software, product lifecycle management, return on investment, total cost of ownership, linux, windows server
    
Red Hat

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Blackberry, iPhone,& Windows

Published By: BlackBerry     Published Date: Apr 13, 2010
Mobile deployments in business are growing at an accelerating rate, enabled by increasingly capable devices at attractive prices, faster, less costly, and more reliable wireless networks being deployed across wider areas, and an expanding array of mobile applications that empower the mobile workforce with an abundance of business critical functions.
Tags : 
blackberry, iphone, windows, wireless networksmicrosoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry

The Third Screen: What Email Marketers Need to Know About Mobile Rendering

Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email
    
BlueHornet

Three Mobile Email Marketing Challenges - and What You Can Do About Them

Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam, mobile email, templates
    
Unica

Achieving NERC Compliance Through Tripwire IT Security and Compliance Automation Solutions

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management, compliance, internet security, business process automation
    
Tripwire, Inc

Storage Efficiency Strategies for Microsoft Application Environments

Published By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco, server virtualization, server operating system, data protection, storage virtualization, total cost of ownership, microsoft exchange
    
NetApp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.