Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

HP-UX

RSS Feed    Add to Google    Add to My Yahoo!
HP-UX White Papers (View All Report Types)
 
The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

ITG - Value Proposition for IBM Power Systems: Virtualisation Impact for Enterprise UNIX and Linux Server Infrastructures
sponsored by IBM
WHITE PAPER: This report by industry analyst International Technology Group evaluates how organisations can reduce IT costs by employing IBM Power Systems and PowerVM verses competitive offerings from HP and Sun Microsystems. Cost savings range from 43 to 65% and are based on client data.
Posted: 02 Oct 2009 | Published: 09 Apr 2009

IBM

Extend the Monitoring of Distributed Applications with Operations Manager 2007 to Heterogeneous Environments with Jalasoft Xian Io
sponsored by JALASOFT
WHITE PAPER: The Distributed Application Designer allows administrators to graphically define components which make up a service. Underlying is Operations Manager System Definition Model (SDM).
Posted: 10 Mar 2008 | Published: 10 Mar 2008

JALASOFT

Sybase Analytic Appliance on IBM Power Systems
sponsored by Sybase, an SAP company
WHITE PAPER: The Sybase Analytic Appliance is revolutionizing the data warehouse appliance market by integrating the leading column-based analytic software with hardware from the industry's number one provider of UNIX systems. Read this paper for more.
Posted: 06 Aug 2009 | Published: 07 Jul 2009

Sybase, an SAP company

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

DreamWorks Animation Utilizes the Red Hat Portfolio to Build a Private Cloud
sponsored by Red Hat and HP
WHITE PAPER: Access this white paper to discover how one leading animation studio uses Linux to enable rapid and cost-efficient scalability of computing and resources for high-performance compute (HPC) workloads. Learn how your organization can reduce your data center footprint and enhance reliability by using this Linux platform.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Red Hat and HP

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement