Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Berkeley Source Distribution

RSS Feed    Add to Google    Add to My Yahoo!
Berkeley Source DistributionReports
 
Migrate from AIX confidently with Linux
sponsored by Red Hat
WHITE PAPER: This whitepaper explains more about the reasons to migrate to Linux, including increasing hardware choices and moving commodity platforms, as well as why Red Hat Enterprise Linux could be exactly the platform you need.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

Red Hat

Unix-to-Linux Migrations Handbook
sponsored by SearchDataCenter.com
WHITE PAPER: This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchDataCenter.com

Endress + Hauser Success Story
sponsored by SUSE
WHITE PAPER: This white paper outlines how one organization successfully migrated to Linux and consolidated 14 physical servers to a single IBM System z mainframe. Inside, discover how your business can consolidate physical servers and realize other valuable benefits like rapid provisioning and easy management of virtualized Linux environments.
Posted: 19 Jun 2012 | Published: 19 Jun 2012

SUSE

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Sunny Days with Cloud Computing
sponsored by Stoneware, Inc.
WHITE PAPER: This whitepaper discusses "Cloud Computing" which is a new catch phrase or buzzword for an approach to simplifying an organization's IT environment through the use of virtualization and web technologies.
Posted: 30 Jul 2008 | Published: 16 May 2008

Stoneware, Inc.

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Data Center Modernization: 8 Best Practices for Unix to Linux Migration
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains why many companies are replacing their proprietary hardware and software with x86-based servers running Linux. Access best practices to help you effectively plan your migration and ensure a smooth transition.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

Dell, Inc.

Expert Migration Tips: Moving from Unix to Linux
sponsored by Red Hat and HP
EGUIDE: In this expert e-guide from SearchEnterpriseLinux.com, discover what makes migrating from Unix to Linux attractive, including increased platform flexibility. And learn why it is essential to have a testing environment for gauging stability and performance of your applications.
Posted: 16 Feb 2011 | Published: 15 Feb 2011

Red Hat and HP

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement