operating systems

Results 101 - 125 of 167Sort Results By: Published Date | Title | Company Name

Protecting Linux Systems

Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan
    
Microworld

Protecting sensitive corporate data from the full spectrum of mobile risks

Published By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : 
data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
    
Lookout

Purdue Pharma L.P. Case Study

Published By: Dell EMC     Published Date: Nov 06, 2015
Learn how Purdue Pharma decreased projected capital budget by one-third annually and are expected to reduce operating expenses by $2 million over the next 5 years with Vblock Systems.
Tags : 
emc, pharma, vblock, purdue, data management, business technology, data center
    
Dell EMC

Redefine Windows 10 Management - ESP

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

Redefine Windows 10 Management - GER

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

Redefine Windows 10 Management - ITALY

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

Redefine Windows 10 Management - POR

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

Redefine Windows 10 Management – FR

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

Redefine Windows 10 Management – JAP

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch

RISC/UNIX* Migration Planning Guide

Published By: Intel     Published Date: Jun 22, 2015
This planning guide provides information to help you build the case for moving mission-critical workloads from legacy proprietary systems such as RISC/UNIX to Intel Xeon processor-based solutions running Linux or Windows operating systems.
Tags : 
    
Intel

Rugged Laptops Deliver Reliability, Security in Harsh Work Environments

Published By: Dell     Published Date: Nov 20, 2014
Harsh environments for PCs are not confined to factory floors and constructions sites today. They also include hospitals, trucks, and even some classroom settings, among others. A new study from IDG Research and related two-page paper detail just what environmental threats worry buyers the most, and therefore what laptop purchasing criteria rank the highest. Tying together strong computing capability with a highly productive operating system in the right rugged notebook solution is possible. Download this two-page paper to learn the most important factors driving needs for refreshed rugged systems.
Tags : 
rugged laptops, environmental threats, laptop purchasing criteria, refreshed rugged systems
    
Dell

SAN-Aware Operating Systems Enable Server-Based Storage Provisioning

Published By: Dell Storage     Published Date: Jan 16, 2009
Storage consolidation was a launching point for various new technologies delivering advanced functionality. The next generational shift that is in process will free storage administrators from handling storage provisioning for applications – instead, applications will be able to request and provision storage for themselves. While today multiple tools are required to add storage to your database, soon the database will be able to take care of that itself.
Tags : 
dell, san-aware operating systems, storage area networks, storage provisioning, simplifying network storage, storage, iscsi, network attached storage
    
Dell Storage

SAP Transaction Banking (TRBK) benchmark

Published By: IBM     Published Date: Oct 01, 2013
SAP Transaction Banking (TRBK) benchmark
Tags : 
ibm, ibm servers, servers, operating systems, transaction banking, application servers, server memory, database servers
    
IBM

Security for the Mobile First Era: Mobile Operating Systems are Inherently Secure

Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron

Shortcut Guide to Business Security Measures Using SSL

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
    
VeriSign Authentication Services, now a part of Symantec Corp.

Six Fairy Tales of VMware and Hyper-V Backup

Published By: Unitrends     Published Date: Dec 16, 2011
Mware host level backup works well with all deduplication strategies. In this paper we explore 6 fairy tales of VMware and Hyper-V backup.
Tags : 
vmware, hyperv, hyper-v, backup, backup and recovery, deduplication, host level, host-level
    
Unitrends

Solitare Interglobal, Ltd. PowerLinux vs Windows for your SAP Deployments

Published By: IBM     Published Date: Oct 01, 2012
Using data from real customer deployments, Solitaire examines differentiators for SAP deployments on either PowerLinux or Windows. PowerLinux clearly emerges as a preferred platform.
Tags : 
sap deployment, sap, ibm, platform operating systems, business technology
    
IBM

Solution Brief: Red Hat Enterprise Linux on Power Systems

Published By: IBM     Published Date: Oct 06, 2016
Whether you need to enhance application performance, improve reliability or reduce costs, adopting Power Systems can help you achieve your open infrastructure goals. With Red Hat Enterprise Linux 7.1, making that move is now simple. Run enterprise applications and enterprise-grade Linux on a hardware platform that’s ready for the modern workplace.
Tags : 
ibm, operating system, enterprise applications, power systems, big data, cloud economics, application integration, database development
    
IBM

Standardized Operating Environments for IT Efficiency

Published By: Red Hat     Published Date: May 07, 2014
Read this white paper to find out how to boost productivity, increase uptime, and enhance business agility by standardizing your IT environment!
Tags : 
red hat, operating systems, it infrastructure, standardizing it environments, virtualization, cloud deployment, buisness agility, it management
    
Red Hat

State of App Security

Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron

STREAMLINING VM BACKUPS WITH THE PUBLIC CLOUD

Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Currently, this virtualization juggernaut shows no sign of slowing. As businesses recognize the potential for increased reliability and scalability offered by virtual technology, they are ramping up their investments in data center modernization and upgrading. In fact, 33 percent of the respondents to a recent ESG survey on cloud usage said that making greater use of server virtualization was one of their top five spending priorities for the next 12 to 18 months.
Tags : 
    
Druva

Systems of Insight - Moving Beyond Traditional Analytics

Published By: TIBCO Software     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
    
TIBCO Software

The Cisco Connected Factory: Powering a Renaissance in Manufacturing

Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure, infrastructure
    
Cisco

The Cisco Connected Factory: Powering a Renaissance in Manufacturing

Published By: Cisco     Published Date: Jun 21, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
    
Cisco

The Impact of Device Selection on the Success, Benefits and TCO of Your Mobility Solution

Published By: Zebra Technologies     Published Date: Jul 19, 2017
Whether you’re in retail, manufacturing, warehouse management, transportation or healthcare, a mobility solution is a great way to empower your employees to do more. But maximizing the value and success of your mobility solution hinges on one critical decision: choosing the right mobile devices. This white paper takes a look at how choosing the TC51/TC56 for a mobility solution can have a significant impact on the overall success of your initiative.
Tags : 
device selection, staff collaboration, loyal shopper, delivery driver, mobility solution, device function, operating systems, os security services
    
Zebra Technologies
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.