Microsoft Windows Reports

Computer Weekly: Data Danger
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
Posted: 08 Feb 2021 | Published: 14 Dec 2016

TechTarget ComputerWeekly.com

Computer Weekly - 27 July 2021: Are we getting cyber security skills all wrong?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the chair of the new UK Cyber Security Council tells us how she plans to fundamentally reimagine what working in IT security means. Our latest buyer's guide examines ERP modernisation and its role in digital transformation. And we take an in-depth look at the first preview version of Windows 11. Read the issue now.
Posted: 23 Jul 2021 | Published: 27 Jul 2021

TechTarget ComputerWeekly.com

Windows 8 Security: Know All You Need to Know
sponsored by IBM
EBOOK: This expert e-book describes how to best take advantage of the security features in Windows 8 and 8.1.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

IBM

Computer Weekly – 6 October 2015: What's on your desktop?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Microsoft has released Office 2016 and is urging customers to migrate to Windows 10 – but is a desktop upgrade worth the hassle? We report from the Dreamforce conference on the latest products from Salesforce.com.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget ComputerWeekly.com

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by TechTarget Mobile Computing
EBOOK: In this expert e-book, technology expert Bryan Barringer explains how studying user habits, using modern software development methodologies and constantly monitoring performance can lead to successful adoption of mobile apps. Also discover how mobile remote desktop apps work, and how employee productivity can get a boost from mobile apps.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

TechTarget Mobile Computing

Upgrading to Windows 10: Pros & Cons for Your Enterprise
sponsored by TechTarget Enterprise Desktop
EBOOK: In this guide, learn about the features and benefits of Windows 10—such as an improved user interface—that could persuade users, IT managers, and administrators to adopt.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

TechTarget Enterprise Desktop

Strategies for Overcoming SQL Database Migration Limitations
sponsored by Rackspace Technology
EGUIDE: In this expert e-guide, we identify the major challenges of cloud-based relational database migrations. You'll find out what the specific obstacles are to your transition and get targeted advice for updating your database.
Posted: 02 Aug 2016 | Published: 29 Jul 2016

Rackspace Technology

Computer Weekly - 6 July 2021: Where to start with Windows 11
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.
Posted: 05 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Active Directory Disasters and Tools to Prevent Them
sponsored by Quest
WHITE PAPER: Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?
Posted: 16 May 2014 | Published: 09 Jan 2013

Quest