Operating Environments Reports

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TechTarget ComputerWeekly.com

Computer Weekly – 29 November 2016: Machine learning keeps customers happy at Ocado
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how data scientists at online grocer Ocado are using machine learning technology to deliver better customer service. Manufacturing giant GE is making a play to become a top 10 software supplier. And we examine the future of server operating systems as workloads move to the cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Nov 2016

TechTarget ComputerWeekly.com

Windows 10 Momentum Continues to Build
sponsored by Flexera Software
EGUIDE: In this expert e-guide, we examine how Windows 10 is growing as a highly productive development environment. Find out how the OS is generating new opportunities for developers and how it's impacting Microsoft's future in cloud, mobile, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Flexera Software

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

The Migration from Windows Server 2003 to Linux
sponsored by Red Hat
WHITE PAPER: This white paper discusses the process of migrating to Linux and explains why the end of Windows Server 2003 may be the best opportunity to do so.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Red Hat

Computer Weekly – 18 November 2014: Cloud providers are coming to Europe
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, more cloud providers are building datacentres in Europe in response to data protection concerns – we examine the latest developments. Microsoft is embracing the cloud and decoupling Office from Windows – we look at the implications for corporate IT. And we analyse the rise of desktop as a service. Read the issue now.
Posted: 14 Nov 2014 | Published: 14 Nov 2014

TechTarget ComputerWeekly.com

Updating Your Corporate BYOD Program for Success
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Reasons for Windows 10 Migration Multiply
sponsored by Flexera Software
EGUIDE: Milestones like the end of sales for Windows 7 Professional are making users consider the transition to Windows 10. In this e-guide, we explore the motivations behind Windows 10's rapid rate of adoption. You'll find out what reasons are driving corporate OS migrations, how to handle the updates that accompany them, and more.
Posted: 02 Sep 2016 | Published: 31 Aug 2016

Flexera Software

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by TechTarget Security
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

TechTarget Security