Operating systems

Whether its UNIX, Linux, OS, or Windows you favor, TechRepublic has everything you need to know to keep things running smoothly.

  • Tools & Templates // Nov 2009

    The ARP Gadget

    Windows offers a command-line utility that lets you examine or modify the ARP cache. To make the tool easier to use, Greg Shultz has 'gadgetized' it for Vista and Windows 7. Visit our Microsoft Windows blog for more Windows information and resources.

    Provided By Greg Shultz

  • Tools & Templates // Dec 2009

    The XCopy Tool

    The XCopy command has risen from the ashes of deprecation to save you time and make your file management tasks easier. This tool automates the process for XP, Vista, and Windows 7.Visit our Microsoft Windows blog for more Windows information and resources.

    Provided By Greg Shultz

  • Tools & Templates // Feb 2010

    The TaskList Gadget

    The TaskList utility provides details on the services and DLL modules related to running processes. Now, there's a Vista/Windows 7 gadget that does the job without the command-line headaches.For more Windows resources, visit our Microsoft Windows blog.

    Provided By Greg Shultz

  • Downloads // Oct 2010

    Make the Choice command work for you even in Windows 7

    You can use the batch file command Choice to make your batch files interactive. Greg Shultz shows how it can come in handy even in Windows 7 with an example batch file that automates the IP Configuration commands. For a complete explanation, read the original Microsoft Windows blog post.

    Provided By Greg Shultz

  • Downloads // Jul 2008

    Run UAC restricted programs without the UAC prompt

    Greg Shultz shows you how to create a task in Task Scheduler that will launch an application with the highest available privileges in Microsoft Windows Vista, and then he shows you how to create a shortcut to run that application anytime you want. This download is also available as an...

    Provided By Greg Shultz

  • Downloads // Aug 2008

    How do I... Create a Suspend Mode shortcut in Windows XP?

    You don't need third-party software or expensive keyboards to quickly put your Microsoft Windows XP personal computer into Suspend Mode. All you need is a special shortcut. Greg Shultz shows you how to create it. This download is also available as an entry in the TechRepublic Microsoft Windows blog.

    Provided By Greg Shultz

  • White Papers // Nov 2010

    TCS Windows 7 - Comprehensive Migration Solution

    Windows 7 - Microsoft's latest desktop Operating System (OS) - is emerging as a stable and desirable next generation operating system, that ushers in state of the art technology to help meet ever-increasing and complex business needs. Windows 7 is quickly becoming a corporate desktop OS standard, justifiable as a...

    Provided By Tata Consultancy Services

  • White Papers // Sep 2010

    Large Call Centers Migrating to Asterisk

    This white paper will focus on key considerations to be made when selecting and migrating to a new contact center technology platform, including "How to reduce substantial initial capital investment", "How to avoid proprietary equipment lock-in", "How to manage risk when migrating", and "How to achieve rich ACD functionality". It...

    Provided By Indosoft

  • White Papers // Jun 2012

    Diskeeper 12: Improving the Performance of SAN Storage

    The task of maintaining peak performance is critical for the modern storage administrator. More and more mission-critical applications rely on the shared storage infrastructure for real-time activity, and enterprise-level businesses are graduating live workstations and production servers to SAN systems. Meanwhile, the potential for resource bottlenecks becomes more complicated due...

    Provided By Condusiv Technologies

  • White Papers // Apr 2012

    Running Diskeeper and V-locity on SAN Devices

    This brief discusses some of the myths and concerns regarding defragmentation on SAN devices. In most cases, a "standard disk defragmenter" should not be run on a SAN device, but Diskeeper and V-locity are not "standard disk defragmenters." They are storage optimizers that contain technology and innovations that are designed...

    Provided By Condusiv Technologies

  • White Papers // Apr 2012

    Windows Defragmenter: Not Good Enough

    This brief discusses how the Windows Built-in Disk Defragmenter was originally designed as a band-aid for low active systems and, although it has evolved, Diskeeper and V-locity have evolved leaps and bounds in this same time period to keep up with the ever-evolving technologies, such as Virtualization and the huge...

    Provided By Condusiv Technologies

  • White Papers // Feb 2013

    The End of Fragmentation: How to Keep Windows Systems Running Like New

    Imagine a Windows system that maintains optimum performance over time and never needs to be “de-fragged” again. By proactively optimizing I/O at the Windows level, fragmentation is prevented before it ever becomes a problem. As a result, Windows systems continue to run like new. This white paper examines what productive...

    Provided By Condusiv Technologies

  • White Papers // Oct 2013

    Achieve Continuous Data Protection with a Recycle Bin for File Servers

    “Help! I deleted a file off the network drive!” What if there were a recycle bin for file servers with self-service recovery? You’d never have to dig through backups to recover files, or run constant snapshots. Fill the gap between backups and the limitations of the Windows recycle bin, and...

    Provided By Condusiv Technologies

  • White Papers // May 2009

    Post-Copy Live Migration of Virtual Machines

    This paper presents the design, implementation, and evaluation of post-copy based live migration for Virtual Machines (VMs) across a Gigabit LAN. Post-copy migration defers the transfer of a VM's memory contents until after its processor state has been sent to the target host. This deferral is in contrast to the...

    Provided By Binghamton University

  • White Papers // Jun 2009

    Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs

    It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks,...

    Provided By Middle East Technical University

  • White Papers // Jan 2010

    Distributed Computing, Middleware and Migration

    The theme of this paper is sharing: the sharing of both data and functions by different systems and across different platforms and processes. This leads them to the consideration of the technology of distributed systems, client-server computing, object request brokers, message-oriented middleware, distributed databases, knowledge management and workflow systems. This...

    Provided By TriReme International

  • White Papers // Dec 2010

    Security Evaluation and Hardening of Free and Open Source Software (FOSS)

    Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term solution that deserves careful consideration because of its potential for significant cost savings, improved reliability, and numerous advantages over proprietary software. However, the secure integration of...

    Provided By Concordia University

  • White Papers // Apr 2014

    Windows® XP Migration: Protect and Secure Critical Data

    With the end of the Microsoft Windows XP operating system’s lifecycle on April 8, 2014, businesses are faced with the decision to migrate to a newer operating system or to continue with XP without continuing security updates. This solution brief discusses how CommVault Simpana software can help business protect and...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • White Papers // Apr 2014

    5 eDiscovery Challenges Solved

    eDiscovery challenges continue to present themselves as data storage becomes more complex and grows the Big Data Era. Read this CommVault Solution Brief to learn how to deal with 5 persistent eDiscovery challenges with Simpana 10 software.

    Provided By CommVault Systems

  • White Papers // Jun 2009

    PC Migration Technology & Windows 7

    The PCmover Migration Technology White Paper describes the basic mechanism that PCmover uses to intelligently and automatically transfer installed applications, registry entries, user accounts, data, desktop settings, and other items to a new PC. PCmover is an application for the Microsoft Windows platform and supports migrations from Windows 95 through...

    Provided By Laplink Software

  • White Papers // Sep 2009

    Key Differentiators Between PerfectDisk and Windows 7 Disk Defragmenter

    This paper provides an overview of the difference between PerfectDisk and the Window 7 defragmenter based on key areas of functionality and defragmentation methods. The process of comparing two utilities that perform a similar function is not necessarily a case of comparing "Apples to apples," as the two utilities' philosophies...

    Provided By Raxco Software

  • White Papers // Sep 2009

    The Key Differentiators Between PerfectDisk and the Windows 7 Disk Defragmenter

    This paper provides an overview of the differences between PerfectDisk and the Windows 7 defragmenter based on key areas of functionality and defragmentation methods. The process of comparing two utilities that perform a similar function (i.e. disk defragmentation) is not necessarily a case of comparing "Apples to apples," as the...

    Provided By Raxco Software

  • Downloads // Aug 2008

    How do I... Recover a damaged Windows XP user profile?

    A user profile on a Windows XP system contains all the files and settings needed to configure your work environment. If the user profile becomes damaged, The operating system will then automatically create a new user profile and log you into this new profile complete with default settings. Greg Shultz...

    Provided By Greg Shultz

  • Downloads // Sep 2008

    How do I... Use the Vista Check Disk tool for hard disk analysis?

    In most cases, Vista will recognize hard disk problems and automatically schedule Check Disk to run the next time the computer is restarted. However, if you're the proactive type, you might want to keep tabs on the status of your hard disk's health yourself rather than wait for Vista to...

    Provided By Greg Shultz

  • Downloads // Oct 2008

    Investigate RAM problems with Vista's Windows Memory Diagnostic Tool

    If you're encountering application failures, operating system faults, or Stop errors in Windows Vista, you could have defective or failing RAM. Microsoft included the Windows Memory Diagnostic Tool in Windows Vista so that you can test the RAM chips in your system. In this edition of the Windows Vista Report,...

    Provided By Greg Shultz

  • Downloads // Oct 2008

    Know what to do when Check Disks malfunctions in Vista

    The Check Disk application in Microsoft Windows Vista can sometimes malfunction, causing problems during the boot process. In answer to several TechRepublic member questions, Greg Shultz explores the problems in this issue of the Windows Vista Report, and describes how to permanently fix them. This download is also available as...

    Provided By Greg Shultz

  • Downloads // Oct 2008

    A new virtual desktop tool from Microsoft's Windows Sysinternals team

    Microsoft's Windows Sysinternals team has developed a lightweight and very dependable virtual desktop manager called Desktops that allows you to create up to four virtual desktops on your computer. This allows you to spread out your applications on the various desktops. In this edition of the Windows Vista Report, Greg...

    Provided By Greg Shultz

  • Downloads // Oct 2008

    Troubleshoot Vista system drivers more efficiently with these tools

    While in the last year many of the most common driver problems have been solved, you may still incur strange or erratic problems related to drivers in Microsoft Windows Vista. To make the task of gathering information on a number of device drivers easier, you can use a native command...

    Provided By Greg Shultz

  • Downloads // Oct 2008

    Use Maple to manage and retrieve vital documents

    Using a series of documents and folders to store all your information is a pretty logical way of doing things, especially when used in combination with Vista's Search tool and Saved searches feature, keeping track of all that information is pretty easy. However, it could be better. In this edition...

    Provided By Greg Shultz

  • Book chapters // Aug 2009

    Working with the Windows 7 Registry

    In his recently published book Microsoft Windows 7 Unleashed, author Paul McFedries introduces a variety of techniques, workarounds, obscure details, and customization tricks to help you get more out of Windows 7. This sample chapter offers a solid introduction to working with the Windows 7 Registry.

    Provided By Sams Publishing

  • Downloads // Nov 2006

    Use this registry file to enable S3 sleep mode in Windows XP

    Windows XP includes a registry key that prevents PCs from dropping down to S3 sleep mode when USB KB/Mouse devices are detected. Microsoft implemented this setting by default because some hardware won't be able to wake from S3 mode if a USB keyboard and mouse are plugged in. This registry...

    Provided By George Ou

  • Book chapters // Jul 2006

    Create innovative and dramatic Powerpoint presentations, Hollywood style

    This sample chapter from Beyond Bullet Points: Using Microsoft PowerPoint to Create Presentations That Inform, Motivate, and Inspire introduces the "Beyond Bullet Points" approach to Powerpoint presentations. Inspired by the concepts of a Hollywood script, storyboard, and a combination of movie and live performance, this three-step approach can be implemented...

    Provided By Microsoft Press

  • Book chapters // Oct 2009

    Tune Windows 7 for maximum speed and efficiency

    This sample chapter from Microsoft Windows 7 Unleashed explains how to monitor Windows 7 system performance and optimize startup, applications, the hard disk, and virtual memory. Title: Microsoft Windows 7 Unleashed Author: Paul McFedries Chapter 6 "Tuning...

    Provided By Sams Publishing

  • Downloads // Oct 2009

    The 10 most useful Windows 7 keyboard shortcuts

    Along with Windows 7's new features comes a set of new keyboard shortcuts. This little cheat sheet will help you work more efficiently with the new OS.This download is also available as an entry in our 10 Things blog.

    Provided By Jody Gilbert

  • Downloads // Dec 2008

    10 security tips for Microsoft Windows XP

    Installing Windows XP is only the first step to using it. Chad Perrin advises these additional measures to ensure that your XP systems are protected from proliferating security threats.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • White Papers // Nov 2011

    A New Energy Saving Mechanism in IEEE 802.16e/m

    To extend lifetime of battery-powered mobile device before its recharging in broadband wireless access networks, power saving mechanism in MAC (Medium Access Control) has become a significant design issue. Basically, a power saving mechanism is manipulated by adjusting operating parameters such as The minimum sleep interval (Tmin) and The maximum...

    Provided By Science and Development Network (SciDev.Net)

  • White Papers // Apr 2010

    Pain Free Migrations to Hosted Exchange

    For many, migrations are daunting processes that require long nights and weekends at the office and endless hours of testing and validating data. IT professionals know that email systems are complex, layered applications and users' important data can easily be altered, tangled or completely left behind in a migration. Performing...

    Provided By Intermedia.NET

  • Downloads // Jan 2010

    Paragon Drive Backup 10.0 Server Trial

    This highly-rated tool set for backup and recovery provides powerful features to effectively protect valuable company data and systems. Experienced Windows users, Boot Camp users, system administrators and IT experts leverage robust technologies and time saving wizards to safely backup - and restore - the company's servers, workstations, and laptops....

    Provided By Paragon Software

  • White Papers // Sep 2012

    Is Linux Kernel Oops Useful or Not?

    Linux kernel oops is invoked when the kernel detects an erroneous state inside itself. It kills an offending process and allows Linux to continue its operation under a compromised reliability. The authors investigate how reliable Linux is after a kernel oops in this paper. To investigate the reliability after a...

    Provided By Keio University