Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Berkeley Source Distribution

RSS Feed    Add to Google    Add to My Yahoo!
Berkeley Source Distribution White Papers (View All Report Types)
 
Unix-to-Linux Migrations Handbook
sponsored by SearchDataCenter.com
WHITE PAPER: This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchDataCenter.com

End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.
Posted: 13 Nov 2009 | Published: 30 Oct 2008

Hewlett Packard Enterprise

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation

Moving From Solaris To Red Hat Enterprise Linux
sponsored by Red Hat and HP
WHITE PAPER: Red Hat® Enterprise Linux® is a standards-based UNIX®-like operating system that provides a development environment similar to SunTM SolarisTM. This paper looks to highlight some of the major differences between Solaris and Red Hat Enterprise Linux to help application developers port their code.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and HP

IBM Sets Pace in Unix Virtualization
sponsored by IBM
WHITE PAPER: This Gabriel Consulting report research report focuses on the survey results and discusses IBM’s Power Systems virtualization milestones and touches on the implications for the Unix server market.
Posted: 15 Jun 2010 | Published: 16 Jun 2010

IBM

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

ITG - Value Proposition for IBM Power Systems: Virtualisation Impact for Enterprise UNIX and Linux Server Infrastructures
sponsored by IBM
WHITE PAPER: This report by industry analyst International Technology Group evaluates how organisations can reduce IT costs by employing IBM Power Systems and PowerVM verses competitive offerings from HP and Sun Microsystems. Cost savings range from 43 to 65% and are based on client data.
Posted: 02 Oct 2009 | Published: 09 Apr 2009

IBM

Linux Made Easy: Migrating From Unix
sponsored by Red Hat & IBM
WHITE PAPER: Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Fabbrica Automatismi Apertura Cancelli Story
sponsored by SUSE
WHITE PAPER: Access this white paper to learn how one company migrated from its legacy IBM i platform to Linux which reduced costs, improved performance and simplified system management processes. Discover how your organization can achieve similar benefits as well as improve response time and reduce workloads.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

SUSE

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement