Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

HP OpenVMS

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: VAX/VMS, VMS, OpenVMS
DEFINITION: OpenVMS is an operating system from the Digital Equipment Corporation (DEC) that runs in both its VAX and Alpha computers. OpenVMS evolved from VMS, which originated as the operating system for the VAX in 1979. VMS exploited the concept of virtual memory. DEC is now part of Compaq. OpenVMS is a multitasking and multiprocessing operating system based on VMS; it was renamed OpenVMS when it was redeveloped  … 
Definition continues below.
HP OpenVMSWhite Papers (View All Report Types)
26 - 50 of 447 Matches Previous Page  | Next Page
Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Agile Storage Infrastructure for Mainframe Environments
sponsored by Hitachi Data Systems
WHITE PAPER: The new Hitachi Virtual Storage Platform delivers the best performance and capacity combined with lowest power consumption and lower cooling requirements, consuming up to 40% less power than its predecessor. Learn more.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Hitachi Data Systems

Analyst Report: IBM CICS Tools: Discovery and Optimization for the Next Generation by the Branham Group (February 2013)
sponsored by IBM
WHITE PAPER: This independent white paper discusses the challenges that IT departments face in cost and manpower hours. It looks at several tools that have been shown to significantly reduce the time needed to meet those challenges with resultant deep cost benefits.
Posted: 21 Feb 2014 | Published: 01 Jan 2013

IBM

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Architecting Oracle VM Solution with Sun ZFS Storage Appliances and Sun Servers
sponsored by Oracle Corporation
WHITE PAPER: With virtualization and its ability to install multiple operating systems (OSs) and run them independently on a single server, IT can effectively consolidate hundreds of servers while optimizing resources and simplifying the infrastructure. Read this paper to find out so much more.
Posted: 01 Oct 2010 | Published: 01 Sep 2010

Oracle Corporation

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Automating Processes to Optimize a Windows 7 Deployment
sponsored by Dell, Inc. and Microsoft Windows 7
WHITE PAPER: IDC estimates that the average cost of deployment activities is $527 per PC, but can go as high as $700 or more depending on the time spent by IT staff and users. Reducing the cost of deployment will significantly reduce the total cost of ownership—especially in combination with cost-saving features in Microsoft Windows 7.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Dell, Inc. and Microsoft Windows 7

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Bringing Automation to the Data Center
sponsored by CA Technologies.
WHITE PAPER: A number of factors have emerged that clearly demonstrate the requirement for a more holistic approach to data center management.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

CA Technologies.

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Enterasys
WHITE PAPER: In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 01 Jun 2012 | Published: 30 Apr 2012

Enterasys

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation
26 - 50 of 447 Matches Previous Page    1 2 3 4 5    Next Page
 
HP OPENVMS DEFINITION (continued): … OpenVMS is an operating system from the Digital Equipment Corporation (DEC) that runs in both its VAX and Alpha computers. OpenVMS evolved from VMS, which originated as the operating system for the VAX in 1979. VMS exploited the concept of virtual memory. DEC is now part of Compaq. OpenVMS is a multitasking and multiprocessing operating system based on VMS; it was renamed OpenVMS when it was redeveloped for the Alpha processor. (OpenVMS is also the name now used on the VAX computer.) The "Open" suggests the added support for the UNIX-like interfaces of the POSIX standard. Programs written to the POSIX standard, which includes a set of standard C language programming functions, can be ported to any POSIX-supporting computer platform. Formerly a 32-bit operating system, more recent versions of OpenVMS support 64-bit instructions.Among other features, OpenVMS can be used with special software that facilitates its use with Windows servers.
HP OpenVMS definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement