Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Berkeley UNIX

RSS Feed    Add to Google    Add to My Yahoo!
Berkeley UNIX Reports
Unix to Linux Migration Implementation Tips
sponsored by
EGUIDE: Access this essential e-guide from our editors to discover how migrating from Unix to Linux platform can increase flexibility while reducing overall licensing costs. Also, get implementation tips for porting, upgrading and testing applications for optimal stability and performance.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

Expert Strategies for Making a Unix-to-Linux Business Case
sponsored by
EGUIDE: Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

Dell, Inc. and Intel®

Oracle Solaris: Providing A Server Solution with the Cloud in Mind
sponsored by Oracle Corporation
WHITE PAPER: Explore this informative resource to learn about a server hardware and operating system paring from Oracle that can provide you the instant benefits of improved application performance, availability, increased eco-efficiency, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Oracle Corporation

MegaCryption v6.2
sponsored by Advanced Software Products Group, Inc. (ASPG, Inc.)
TRIAL SOFTWARE: ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux.
Posted: 06 Mar 2009 | Premiered: 06 Mar 2009

Advanced Software Products Group, Inc. (ASPG, Inc.)

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement