Executives (Software) Reports

Updates: The next evolution of operating systems
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at how operating systems are evolving with the help of continuous updates. Learn about how the Spectre and Meltdown microprocessor flaws have led to improved, more secure processors being released and how Microsoft is evolving its Windows desktop operating system.
Posted: 08 Feb 2021 | Published: 16 Jan 2018

TechTarget ComputerWeekly.com

IT Handbook: Windows 8 Migration Station
sponsored by DELL TECHNOLOGIES AND MICROSOFT
EBOOK: This handbook presents best practices for moving to Microsoft's latest operating system, including assessing your organization's needs to determine whether Windows 8 is a good fit, which applications should move over, and what help is out there for your migration project and licensing.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

DELL TECHNOLOGIES AND MICROSOFT

Windows 7 Application Migration Checklist
sponsored by Citrix
WHITE PAPER: This resource provides a step-by-stop guide to a successful migration to Windows 7 including hints from your peers who have completed the upgrade. Get a checklist for optimizing your migration plan to avoid potential errors.
Posted: 25 Sep 2012 | Published: 25 Sep 2012

Citrix

Computer Weekly – 5 November 2013: Windows Server 2012 R2 reviewed
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the latest release of Microsoft's Windows Server software, and assess its new features for cloud, virtualisation and device management. We visit Chinese networking giant Huawei to hear its business challenges over US security. And we look at the options for financing IT purchases. Read the issue now.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

TechTarget ComputerWeekly.com

Citrix AppDNA Product-overview
sponsored by Citrix
PRODUCT DEMO: This webcast details a software solution that enables faster migrations and streamlines your desktop application management. Discover how this solution simplifies the evaluation of application performance, and resolves compatibility issues through automation, remediation and modeling analysis. View a short demo and learn about the key benefits.
Posted: 02 Oct 2012 | Premiered: 02 Oct 2012

Citrix

Tablets and Smartphones in the Enterprise: Risks and Management Concerns
sponsored by TechTarget Security
EBOOK: This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time.
Posted: 21 Aug 2012 | Published: 21 Aug 2012

TechTarget Security

Your Role in AWS Security
sponsored by TechTarget Search AWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TechTarget Search AWS

How to create a near-perfect Windows 10 deployment
sponsored by Citrix
EGUIDE: Windows 10 deployments can be a challenge for many IT departments. The OS comes with its fair share of issues related to storage, security, updates and more. Download this e-guide to learn tips to successfully deploy Windows 10 in your organization.
Posted: 25 Oct 2017 | Published: 20 Oct 2017

Citrix

Updating Your Corporate BYOD Program for Success
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Desktop management tools still an IT staple
sponsored by TechTarget Enterprise Desktop
EBOOK: Despite the rise of mobility, PCs remain prevalent in the business world. So desktop management tools are a must for IT departments looking to secure and control these devices.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

TechTarget Enterprise Desktop