Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Berkeley UNIX

RSS Feed    Add to Google    Add to My Yahoo!
Berkeley UNIX Reports
 
Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

The Value of Power VM Workload Partitions: New Virtualization Options in IBM AIX v6.1
sponsored by IBM
WHITE PAPER: This paper examines the flexibility that WPARs offer IT professionals in their virtualized UNIX server environments and review how WPARs are different from other partitioning technologies.
Posted: 18 Jul 2008 | Published: 01 Feb 2008

IBM

Mainframe Performance Management: A New Twist
sponsored by CA Technologies.
WHITE PAPER: Read this white paper featuring mainframe expert Wayne Kernochan to gain insight on insight on performance management software - specifically as it relates to the mainframe - and on why this technology is more important now than ever before.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

CA Technologies.

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

HP-UX 11i on Integrity servers: HP value for Solaris users
sponsored by Hewlett-Packard Limited
WEBCAST: Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users.
Posted: 19 May 2010 | Premiered: Jan 1, 2010

Hewlett-Packard Limited

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

The Advantages of Virtualized Linux for Business-Critical Applications
sponsored by SUSE
WHITE PAPER: This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.
Posted: 18 Apr 2013 | Published: 18 Apr 2013

SUSE

Red Hat Server Modernization TCO Calculator
sponsored by Red Hat & IBM
ASSESSMENT TOOL: This assessment tool compares the projected costs of growing and maintaining a current Unix based server environment with the costs of migrating to a Red Hat Enterprise Linux server environment.
Posted: 09 Jun 2011 | Published: 09 Jun 2011

Red Hat & IBM

Presentation Transcript: Why Enterprises Can’t Afford to NOT Use UNIX for Business-Critical Systems
sponsored by HP & Intel®
PRESENTATION TRANSCRIPT: Companies that use UNIX for business critical systems find value in its reliability, stability and memory management. Learn how not using UNIX can affect the performance and reliability of your business critical systems.
Posted: 24 Aug 2010 | Published: 23 Aug 2010

HP & Intel®

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement