Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Advanced Interactive Executive

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Interactive Executive White Papers (View All Report Types)
Your Legacy App Modernization Guide
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores a modern, open-standards platform that can make legacy apps less complex and costly while introducing innovative features. Discover how this app modernization strategy can boost performance, flexibility, and more.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Dell, Inc.

Unix-to-Linux Migrations Handbook
sponsored by
WHITE PAPER: This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

ITG - Value Proposition for IBM Power Systems: Virtualisation Impact for Enterprise UNIX and Linux Server Infrastructures
sponsored by IBM
WHITE PAPER: This report by industry analyst International Technology Group evaluates how organisations can reduce IT costs by employing IBM Power Systems and PowerVM verses competitive offerings from HP and Sun Microsystems. Cost savings range from 43 to 65% and are based on client data.
Posted: 02 Oct 2009 | Published: 09 Apr 2009


End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.
Posted: 13 Nov 2009 | Published: 30 Oct 2008

Hewlett Packard Enterprise

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

DreamWorks Animation Utilizes the Red Hat Portfolio to Build a Private Cloud
sponsored by Red Hat and HP
WHITE PAPER: Access this white paper to discover how one leading animation studio uses Linux to enable rapid and cost-efficient scalability of computing and resources for high-performance compute (HPC) workloads. Learn how your organization can reduce your data center footprint and enhance reliability by using this Linux platform.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Red Hat and HP

Harmonizing the Twin Trends of Open Source and Virtualization: How Kernel Based Virtual Machine (KVM) Drives Enterprise Business Value
sponsored by Red Hat & IBM
WHITE PAPER: In the 1960s, computers housed in data centers were few in number and this resource was very expensive. As a result utilization of those compute resources was kept very high. In order to optimize the utilization of those...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Data Center Modernization: 8 Best Practices for Unix to Linux Migration
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains why many companies are replacing their proprietary hardware and software with x86-based servers running Linux. Access best practices to help you effectively plan your migration and ensure a smooth transition.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

Dell, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement