Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Xenix

RSS Feed    Add to Google    Add to My Yahoo!
XenixWhite Papers (View All Report Types)
 
Sunny Days with Cloud Computing
sponsored by Stoneware, Inc.
WHITE PAPER: This whitepaper discusses "Cloud Computing" which is a new catch phrase or buzzword for an approach to simplifying an organization's IT environment through the use of virtualization and web technologies.
Posted: 30 Jul 2008 | Published: 16 May 2008

Stoneware, Inc.

Migrating from Solaris to SUSE® Linux Enterprise Server
sponsored by SUSE
WHITE PAPER: Access this white paper to discover real-world examples of top businesses that have benefitted from Linux migration. Learn more about this ever-growing migration trend.
Posted: 04 May 2012 | Published: 04 May 2012

SUSE

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation

Migrating from UNIX*/RISC* to Red Hat Enterprise Linux®on Intel® processor-based Servers
sponsored by Red Hat and HP
WHITE PAPER: This white paper provides high-level guidelines for assessing cost and complexity of a Linux migration and provides tips for planning a smooth, successful and strategic transition. Discover how your organization can add value to its IT infrastructure with the use of open source software.
Posted: 18 Jul 2012 | Published: 31 Dec 2009

Red Hat and HP

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Extend the Monitoring of Distributed Applications with Operations Manager 2007 to Heterogeneous Environments with Jalasoft Xian Io
sponsored by JALASOFT
WHITE PAPER: The Distributed Application Designer allows administrators to graphically define components which make up a service. Underlying is Operations Manager System Definition Model (SDM).
Posted: 10 Mar 2008 | Published: 10 Mar 2008

JALASOFT

Fabbrica Automatismi Apertura Cancelli Story
sponsored by SUSE
WHITE PAPER: Access this white paper to learn how one company migrated from its legacy IBM i platform to Linux which reduced costs, improved performance and simplified system management processes. Discover how your organization can achieve similar benefits as well as improve response time and reduce workloads.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

SUSE

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement