ComputerWeekly.com Research Library

Powered by Bitpipe.com

Operating Systems Research

  • Application data security risks on Android devices

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.

  • Memory corruption attacks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.

  • Mistakes to Avoid when Migrating to Windows 10

    Sponsored by: eTECH Channel

    Access this expert e-guide to explore two articles: the first discusses upgrade planning for a Windows XP to 10 migration, and the second focuses on the costs of putting off a Windows 10 upgrade for organizations currently running on 7.

  • Windows 10: Top 10 Features IT Pros Will Love

    Sponsored by: Microsoft

    This expert e-guide describes the 10 most crucial Windows 10 features that IT pros need to know about, including mobile device management, work folders that regulate access to corporate content, the return of the Start Menu, and 7 more.

  • Where to Begin with Windows 10

    Sponsored by: SearchEnterpriseDesktop

    The information that IT admins need about Windows isn't always easy to find – and it's often difficult to digest. Gain expert insight into Windows 10 migrations, including, major process updates and upgrades in Windows 10, XP-to-Windows 10 migration success tips and tricks, and more.

  • A Computer Weekly Buyer's Guide to Windows 10 Migration

    Sponsored by: ComputerWeekly.com

    In this 12-page buyer's guide, the experts at Computer Weekly explore what you need to about a Windows 10 migration.

  • Upgrading to Windows 10: Pros & Cons for Your Enterprise

    Sponsored by: SearchEnterpriseDesktop

    In this guide, learn about the features and benefits of Windows 10—such as an improved user interface—that could persuade users, IT managers, and administrators to adopt.

  • Your Role in AWS Security

    Sponsored by: SearchAWS

    This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.

  • Taking a Classic Brand into the Digital Age

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how Hornby, the iconic model railway company that also owns Scalextric and Airfix, is moving these classic brands into the digital age. With the release of Windows 10, we ask if businesses should upgrade. And our buyer's guide looks at managing software-as-a-service (SaaS) providers. Read the issue now.

  • The Migration from Windows Server 2003 to Linux

    Sponsored by: Red Hat

    This white paper discusses the process of migrating to Linux and explains why the end of Windows Server 2003 may be the best opportunity to do so.

  • Computer Weekly – 7 July 2015: The IT behind Angry Birds

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.

  • Desktop management tools still an IT staple

    Sponsored by: SearchEnterpriseDesktop

    Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.

  • Sysinternals Still Essential for Desktop Troubleshooting

    Sponsored by: SearchEnterpriseDesktop

    The Windows Sysinternals suite is useful for Windows 7 troubleshooting. Even though there isn't yet Windows 8 support, endpoint admins should still know how the free tools can help.

  • Windows 8 Security: Know All You Need to Know

    Sponsored by: IBM

    This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.

  • Enterprise Mobility Management E-Book Part 3

    Sponsored by: SearchMobileComputing

    Part 3 of this Enterprise Mobility Management e-book deciphers how to benefit from mobile app management (MAM). From third-party MAM to OS-enabled MAM, learn why there will be situations that call for a particular method.

  • Computer Weekly – 18 November 2014: Cloud providers are coming to Europe

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, more cloud providers are building datacentres in Europe in response to data protection concerns – we examine the latest developments. Microsoft is embracing the cloud and decoupling Office from Windows – we look at the implications for corporate IT. And we analyse the rise of desktop as a service. Read the issue now.

  • Plugging Into Zero Clients Powers Investment Programme

    Sponsored by: Dell

    Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.

  • Computer Weekly – 11 November 2014: Migrating away from Windows Server 2003

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as Microsoft prepares to end support for the popular Windows Server 2003 operating system, we assess the risks. We hear from IT leaders delivering benefits from enterprise social media use to improve staff collaboration. And we look at criticisms from Oracle users about software licensing. Read the issue now.

  • On the Horizon: The Benefits of Microsoft Windows Server 2012 R2

    Sponsored by: Dell and Microsoft

    This white paper outlines the new server offered by a leading vendor. Learn about the strategic and tactical choices when migrating to the new system, the most efficient tools, and how it can handle inherent challenges.

  • Red Hat Enterprise Linux Desktop Datasheet

    Sponsored by: Red Hat

    This white paper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a big budget but still want reliable, secure desktop for their users.

  • Compare Windows 8 and Windows® XP Security Problems

    Sponsored by: Lenovo and Microsoft

    This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.

  • Deploying Windows 8 on Intel Architecture-based Tablets

    Sponsored by: Intel

    As more employees look to access enterprise applications and systems via mobile devices, savvy organizations are deploying Windows 8 on tablets. In this white paper, you'll find an overview and a set of best practices for deploying Windows 8 on Intel architecture-based tablets.

  • How to Limit the Risk of Attack on your XP Assets

    Sponsored by: AT&T Cybersecurity

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

  • Windows XP Migration: Protect and Secure Critical Data

    Sponsored by: Commvault

    This informative whitepaper explores strategies for protecting and securing your data when migrating from Windows XP to your new operating system.

  • Computer Weekly – 22 April 2014: Adapting to life after Heartbleed

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.