Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Advanced Interactive Executive

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Interactive ExecutiveReports
 
UNIX to Linux Migration Assessment
sponsored by Red Hat
RESOURCE: Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures.
Posted: 02 Apr 2014 | Published: 31 Dec 2010

Red Hat

ASG-Discovery and Dependency Mapping (ASG-DDM)
sponsored by ASG Software Solutions
WHITE PAPER: This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

ASG Software Solutions

Sybase Analytic Appliance on IBM Power Systems
sponsored by Sybase, an SAP company
WHITE PAPER: The Sybase Analytic Appliance is revolutionizing the data warehouse appliance market by integrating the leading column-based analytic software with hardware from the industry's number one provider of UNIX systems. Read this paper for more.
Posted: 06 Aug 2009 | Published: 07 Jul 2009

Sybase, an SAP company

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

With Enhanced POWER7 Systems, IBM Raises the Ceiling, Again
sponsored by IBM
WHITE PAPER: This white paper identifies the three major players in the UNIX landscape and points out the strengths and limitations of each.
Posted: 16 Jul 2013 | Published: 10 May 2011

IBM

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Skill building takes time. Let knowledge paths pave the way.
sponsored by IBM
RESOURCE CENTER: Check out this resource center to find how-to articles, free trial software, discussion forums, educational videos and podcasts, and hands-on exercises to help develop your skills in technologies and products such as: cloud computing, Java, Linux, open source, Web development, XML, AIX and UNIX, business analytics, information management, and more.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

IBM

Comparing Virtualization Methods for Business
sponsored by IBM.
WEBCAST: This webcast compares the business impact of virtualization on three available platforms, x86, unix and zEnterprise.
Posted: 12 Nov 2013 | Premiered: Oct 23, 2013

IBM.

Presentation Transcript: Why Enterprises Can’t Afford to NOT Use UNIX for Business-Critical Systems
sponsored by HP & Intel®
PRESENTATION TRANSCRIPT: Companies that use UNIX for business critical systems find value in its reliability, stability and memory management. Learn how not using UNIX can affect the performance and reliability of your business critical systems.
Posted: 24 Aug 2010 | Published: 23 Aug 2010

HP & Intel®

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement