Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Berkeley Source Distribution

RSS Feed    Add to Google    Add to My Yahoo!
Berkeley Source DistributionWhite Papers (View All Report Types)
 
Harmonizing the Twin Trends of Open Source and Virtualization: How Kernel Based Virtual Machine (KVM) Drives Enterprise Business Value
sponsored by Red Hat & IBM
WHITE PAPER: In the 1960s, computers housed in data centers were few in number and this resource was very expensive. As a result utilization of those compute resources was kept very high. In order to optimize the utilization of those...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

A Better Approach to Managing File System Data
sponsored by EMC Corporation
WHITE PAPER: File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data.
Posted: 01 May 2006 | Published: 03 Aug 2005

EMC Corporation

DB2 10: What's new in DB2 10 for Linux, UNIX, and Windows
sponsored by IBM
WHITE PAPER: Organizations are buzzing about the upcoming release of the latest version of IBM's DB2. The added features and functionalities offered in the new platform offer cost-savings, improved application performance and better productivity. Read this white paper to learn more about the exciting enhancements and how they can benefit your enterprise.
Posted: 25 Apr 2012 | Published: 03 Apr 2012

IBM

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs
sponsored by IBM
WHITE PAPER: IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on.
Posted: 15 Jun 2010 | Published: 21 Sep 2009

IBM

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.
Posted: 13 Nov 2009 | Published: 30 Oct 2008

Hewlett-Packard Company

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

With Enhanced POWER7 Systems, IBM Raises the Ceiling, Again
sponsored by IBM
WHITE PAPER: This white paper identifies the three major players in the UNIX landscape and points out the strengths and limitations of each.
Posted: 16 Jul 2013 | Published: 10 May 2011

IBM

Mainframe Performance Management: A New Twist
sponsored by CA Technologies.
WHITE PAPER: Read this white paper featuring mainframe expert Wayne Kernochan to gain insight on insight on performance management software - specifically as it relates to the mainframe - and on why this technology is more important now than ever before.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

CA Technologies.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement