ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
EGUIDE:
In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
EGUIDE:
A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.
WHITE PAPER:
Software updates are constant, and it's one of the most challeneging and resource-intensive tasks for an IT department. Securing vulnerabilities remains one of the most essential updates for IT pros. View this informative white paper to learn more about effective patch managment.
EGUIDE:
Dell is now offering thin client devices configured with Windows 10 to enable workspaces to take advantage of the security and management features built into Windows 10. This exclusive e-guide takes a look at what sets apart thin clients with Windows 10 apart from comparable devices.
EBOOK:
This expert guide examines the ins and outs of Windows 8, discussing the benefits and drawbacks of the new operating system so that you can determine if your organization should make them migration.
EZINE:
In this week's Computer Weekly, as Microsoft prepares to end support for the popular Windows Server 2003 operating system, we assess the risks. We hear from IT leaders delivering benefits from enterprise social media use to improve staff collaboration. And we look at criticisms from Oracle users about software licensing. Read the issue now.
EGUIDE:
This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
PRESENTATION TRANSCRIPT:
Access this presentation transcript for highlights from the exciting Red Hat Summit and JBoss World 2012 events in Boston – and for insight into the topics covered in the 150+ sessions on offer - from cloud strategy and development tools, to cost savings, performance analysis and more.