ComputerWeekly.com Research Library

Powered by Bitpipe.com

Operating Systems Multimedia

  • Secure Coding Practices: Avoid OS Command Injection Attacks

    Sponsored by: WhiteHat Security

    Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.

  • How to Limit the Risk of Attack on your XP Assets

    Sponsored by: AT&T Cybersecurity

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

  • How to take Advantage of Security Ops that go Beyond the OS

    Sponsored by: Intel and McAfee

    In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.

  • New Reality of Stealth Crimeware Video

    Sponsored by: Intel

    An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

  • Citrix AppDNA Product-overview

    Sponsored by: Citrix

    This webcast details a software solution that enables faster migrations and streamlines your desktop application management. Discover how this solution simplifies the evaluation of application performance, and resolves compatibility issues through automation, remediation and modeling analysis. View a short demo and learn about the key benefits.

  • Red Hat Enterprise Virtualization Competitive Features, Performance and Price

    Sponsored by: Red Hat and HP

    Access this webcast to learn about the new features of Red Hat Enterprise Virtualization 3.0. This webcast provides a hypervisor comparison and outlines the benefits of choosing an open-source, enterprise-ready option.

  • The State of the i

    Sponsored by: Connectria

    Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.

  • User Virtualisation from AppSense could Reduce the Time and Cost of Windows 7 Migration

    Sponsored by: AppSense

    Access this exclusive video to discover how user virtualisation can reduce the time and cost of a Windows 7 migration.

  • New Platforms, New Technologies, Old Headaches

    Sponsored by: NetIQ

    View this webcast to learn more about the challenges of designing an effective disaster recovery plan for the modern multi-platform data centre.

  • What’s New in VMware ThinApp 4.6

    Sponsored by: VMware, Inc.

    It is important to remember that Web-based applications pose compatibility issues similar to native applications because of the underlying technology components used to create and run them. Learn how utilizing the right software allows you to ensure legacy application compatibility with each successive browser or operating system update.

  • GFI MAX Building Blocks & MSP University Podcast

    Sponsored by: GFI Software

    This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.

  • Video: The All New 2010 Intel Core Processor Family for Business PCs-- Deploy with Confidence

    Sponsored by: Intel

    Watch this brief video to learn how the 2010 Intel Core Processor family prepares your business for today's needs and for tomorrow.

  • Lumension Endpoint Management and Security Suite

    Sponsored by: Lumension

    A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  • CA ARCserve Backup r12.5 Disaster Recovery

    Sponsored by: arcserve

    Check out this demonstration for an explanation of CA ARCserve Backup r12.5 disaster recovery tools. This video offers detailed instructions on this solution's functionality.

  • HP-UX 11i on Integrity servers: HP value for Solaris users

    Sponsored by: Hewlett-Packard Enterprise

    Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users.

  • Best Practices for Integrating Mac OS X into Active Directory

    Sponsored by: CDW

    Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.

  • Windows Server 2008 R2: Top 10 Changes You'll Actually Care About

    Sponsored by: DellEMC and Intel®

    Watch this webcast to learn about the top ten most useful advantages of Windows Server 2008 R2. Gain insight into improvements made to Terminal Services and Hyper-V that can provide your organization with increased flexibility.

  • Get More Virtual with Dell and VMware vSphere

    Sponsored by: DellEMC and Intel®

    Learn how Dell has designed and integrated the Dell EqualLogic Virtual SAN with VMware® vSphere 4.0 with to help you save money and get more virtual.

  • Nucleus RTOS

    Sponsored by: Mentor Graphics

    Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.

  • IBM Tivoli Security User Compliance Management Demo

    Sponsored by: IBM

    This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.

  • Oracle Advanced Customer Services: Solution Support Center

    Sponsored by: Oracle Corporation

    The Oracle Solution Support Center, Oracle's most comprehensive Advanced Customer Service, is the best way to protect mission-critical operations and drive business success.

  • VMware ACE 2

    Sponsored by: VMware, Inc.

    Complex desktop environments have proven difficult for deployments, maintenance, and control. Download this free trial from VMware which combines the power and versatility of virtual machines with the security and control of centrally managed PCs

  • JIRA 3.11

    Sponsored by: Atlassian

    This IT download provides a project management tool known as Atlassian JIRA which is designed to improve the functionality and flexibility of legacy systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.