ComputerWeekly.com Research Library

Powered by Bitpipe.com

Operating Systems Research

  • Seamlessly transition to Windows 10

    Sponsored by: Citrix

    Download this white paper to learn how adopting an app and desktop virtualization strategy will help your organization see a much smoother transition to Win 10, as well as improved user experience, flexibility, and security.

  • How to Harness Your IBM iOS for Digital Transformation

    Sponsored by: Ensono Limited

    This white paper explores the risks and pitfalls of failing to update your IBM OS to keep up with digital transformation, as well as some of the benefits you could realize by allowing a managed cloud partner help you modernize your OS

  • Secure Coding Practices: Avoid OS Command Injection Attacks

    Sponsored by: WhiteHat Security

    Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.

  • Updates: The next evolution of operating systems

    Sponsored by: ComputerWeekly.com

    In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.

  • Which Engineered System is Right for You?

    Sponsored by: Oracle & Explorer

    Engineered systems, some call it converged infrastructure but the biggest difference to appliances is when the OS and software are engineered with the infrastructure in mind. Take a look at five leading engineered systems and see how they fit into your IT environment.

  • A Computer Weekly Buyer's Guide to Client Access

    Sponsored by: ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how to orchestrate the variety of devices in use, how to achieve efficient workforce mobility, and the pressure on operating systems caused by cross-platform access.

  • Machine Learning Keeps Customers Happy at Ocado

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.

  • How Unilever Spreads IT Innovation

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how consumer goods giant Unilever has changed its thinking about IT to support a global digital transformation. The UK boss of Hewlett Packard Enterprise assesses progress after the first year since HP split in two. And we examine how software development is changing in the enterprise. Read the issue now.

  • Computer Weekly: Counting the Real Cost of Financial Cyber Crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Looking Back on 25 Years of Linux

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

  • The Challenge of Unified Workspaces

    Sponsored by: Dell and Intel

    In this expert-guide, learn the 4 top challenges facing end-user computing today, from application updates to security. Then, explore how your IT department can address the issue of unified workspaces head-on.

  • 5 Overlooked Windows 10 Security Risks

    Sponsored by: VMware

    Windows 10 is being promoted as a cure for several security woes, and while it does hold up against zero-day attacks, there are still several weaknesses. This exclusive guide discusses five Windows 10 security issues that are easy to overlook.

  • Five Keys to Keep Windows 10 Strong

    Sponsored by: VMware

    It takes continuous work to ensure that your Windows 10 deployment is as effective as it can be. By instilling a few key habits in your IT team, you can improve your user's experience. With this exclusive guide, complete with a quiz on Windows 10 features, you can improve security power, operational efficiency, and take full advantage of W10.

  • 18 Windows 10 Facts IT Must Know

    Sponsored by: VMware

    Now that Windows 10 has gone through some ups and downs, and has seen a fourth significant upgrade, it is time to see what we know about Windows 10 as it stands right now.

  • Container Starter Guide

    Sponsored by: Tata Communications and Intel

    With more vendors entering the container market, it should be no surprise that their adoption rates are on the rise. Our experts have compiled the best advice for anyone considering a container adoption to give the best understanding of the first steps in laying out your strategy. Download this essential guide today!

  • How to create a near-perfect Windows 10 deployment

    Sponsored by: Citrix

    Windows 10 deployments can be a challenge for many IT departments. The OS comes with its fair share of issues related to storage, security, updates and more. Download this e-guide to learn tips to successfully deploy Windows 10 in your organization.

  • Make the Most of Windows 10: How User Training Can Help

    Sponsored by: Citrix

    Download this e-guide to find out how proper training can help make the most of your Windows 10 deployment.

  • 4 Key Considerations for Securing Operation Technology in the Oil & Gas Industry

    Sponsored by: Bayshore Networks

    The Industrial Internet of Things (IIoT) is revolutionizing the manufacturing industry – but also opens the door to cyber threats. Learn about the opportunities and risks created, and the need for securing the operation technology environment. Plus, discover 4 key considerations to protect industrial assets against cyber threats.

  • How Virtualization Solves Windows Server Upgrade Challenges

    Sponsored by: HPE and Intel® Corporate

    Server OS upgrades can be a puzzling component of your daily routine as an IT administrator. This e-guide walks you through several of the options available to you to help alleviate the strain of this process, discussing the importance of consistent upgrades and the utilization of virtualization management tools.

  • How to Evaluate Server OSes

    Sponsored by: HPE and Intel® Corporate

    This e-guide is designed to set you on the path to making the best decision for you organization. Inside, you will learn what to consider when evaluating a server OS, compare Linux vs Windows, and get an idea of where the rest of the market stands in comparison to these two.

  • How to Evaluate Server OSes

    Sponsored by: Hewlett Packard Enterprise

    This e-guide is designed to set you on the path to making the best decision for you organization. Inside, you will learn what to consider when evaluating a server OS, compare Linux vs Windows, and get an idea of where the rest of the market stands in comparison to these two.

  • How Virtualization Solves Windows Server Upgrade Challenges

    Sponsored by: Hewlett Packard Enterprise

    Server OS upgrades can be a puzzling component of your daily routine as an IT administrator. This e-guide walks you through several of the options available to you to help alleviate the strain of this process, discussing the importance of consistent upgrades and the utilization of virtualization management tools.

  • Orchestrating Harmony between Middleware, Apps, and Operating Systems

    Sponsored by: GigaSpaces Technologies Inc.

    In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.

  • Dell Windows 10 Thin Clients Boost Virtual Desktop Security

    Sponsored by: Dell, Microsoft and Citrix

    Dell is now offering thin client devices configured with Windows 10 to enable workspaces to take advantage of the security and management features built into Windows 10. This exclusive e-guide takes a look at what sets apart thin clients with Windows 10 apart from comparable devices.

  • 10 Interesting Facts about Space

    Sponsored by: HP & Intel

    Read how HP is helping NASA push the boundaries of science and discovery by sending ZBooks powered by Intel® Xeon® processors to the International Space Station. And learn 10 things you probably didn't know about space, like, all of space is not completely silent.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.