Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

SCO UNIX

RSS Feed    Add to Google    Add to My Yahoo!
SCO UNIX White Papers (View All Report Types)
 
Unix-to-Linux Migrations Handbook
sponsored by SearchDataCenter.com
WHITE PAPER: This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchDataCenter.com

Migrate From Unix To Linux In Six Steps
sponsored by Red Hat and JBoss
WHITE PAPER: CIOs are increasingly aware that the Linux® platform offers a low-risk, robust, and value-for-money alternative to traditional UNIX® platforms. This whitepaper will list and describe a simple, six-step process for migrating from UNIX to Linux.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and JBoss

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Oracle Solaris: Providing A Server Solution with the Cloud in Mind
sponsored by Oracle Corporation
WHITE PAPER: Explore this informative resource to learn about a server hardware and operating system paring from Oracle that can provide you the instant benefits of improved application performance, availability, increased eco-efficiency, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Oracle Corporation

DB2 10: What's new in DB2 10 for Linux, UNIX, and Windows
sponsored by IBM
WHITE PAPER: Organizations are buzzing about the upcoming release of the latest version of IBM's DB2. The added features and functionalities offered in the new platform offer cost-savings, improved application performance and better productivity. Read this white paper to learn more about the exciting enhancements and how they can benefit your enterprise.
Posted: 25 Apr 2012 | Published: 03 Apr 2012

IBM

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

End-to-End Service Management in the Virtualized Environment: Delivering on the Promises of Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper proposes an approach for IT to manage virtualized environments and shows how HP Business Service Management software enables IT operations to link specialists and specialized tools into day-to-day operations while keeping promises to business users.
Posted: 13 Nov 2009 | Published: 30 Oct 2008

Hewlett Packard Enterprise

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement