Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

IBM AIX

RSS Feed    Add to Google    Add to My Yahoo!
IBM AIX White Papers (View All Report Types)
 
Open Group technical document: The Single Unix Specification
sponsored by ComputerWeekly.com
WHITE PAPER: This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect.
Posted: 20 Oct 2011 | Published: 25 Oct 2010

ComputerWeekly.com

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

Linux Made Easy: Migrating From Unix
sponsored by Red Hat & IBM
WHITE PAPER: Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs
sponsored by IBM
WHITE PAPER: IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on.
Posted: 15 Jun 2010 | Published: 21 Sep 2009

IBM

Value Proposition for IBM Power Systems: Comparing Costs of IBM PowerVM and x86 VMware for Enterprise Server Virtualization
sponsored by IBM
WHITE PAPER: This white paper examines the advantages of an integrated, UNIX-based server virtualization platform. Compare the TCO and workload capabilities of this architecture with its popular x86 counterparts to determine a best-suited virtualization approach for your organization.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

IBM

Endress + Hauser Success Story
sponsored by SUSE
WHITE PAPER: This white paper outlines how one organization successfully migrated to Linux and consolidated 14 physical servers to a single IBM System z mainframe. Inside, discover how your business can consolidate physical servers and realize other valuable benefits like rapid provisioning and easy management of virtualized Linux environments.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

SUSE

Moving From Solaris To Red Hat Enterprise Linux
sponsored by Red Hat and HP
WHITE PAPER: Red Hat® Enterprise Linux® is a standards-based UNIX®-like operating system that provides a development environment similar to SunTM SolarisTM. This paper looks to highlight some of the major differences between Solaris and Red Hat Enterprise Linux to help application developers port their code.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and HP

End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.
Posted: 13 Nov 2009 | Published: 30 Oct 2008

Hewlett-Packard Company

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement