Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >   UNIX  >   UNIX Shells  >  

Bourne Shell

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Bourne shell is the original UNIX shell (command execution program, often called a command interpreter) that was developed at AT&T. Named for its developer, Stephen Bourne, the Bourne shell is also known by its program name, sh. The shell prompt (character displayed to indicate readiness for input) used is the $ symbol. The Bourne shell family includes the Bourne, Korn shell, bash, and zsh  … 
Definition continues below.
Bourne Shell Reports
101 - 125 of 1136 Matches Previous Page  |  Next Page
Automating Governance with DevOps and Supply Chain Management
sponsored by Sonatype
RESEARCH CONTENT: This Forrester Research report explores how to catch governance up to the speed of rapid app development practices with automated supply chain management. Learn how to deliver on the accelerated DevOps' time-to-market without sacrificing software quality and compliance.
Posted: 02 May 2017 | Published: 10 Nov 2016

Sonatype

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Bank of Ireland Cuts Software Spend for Key Vendors with Snow License Manager 7
sponsored by Snow Software
CASE STUDY: The following case study examines how the bank of Ireland was able to drastically reduce the costs of renewing software licenses; remove unused and duplicated installations, and streamline software procurement with help from Snow. View now and see what the technology they chose can do for your business as well.
Posted: 14 Mar 2016 | Published: 14 Mar 2016

Snow Software

Best Practices for Integrating Business Process Management
sponsored by MuleSoft
WHITE PAPER: This white paper explores how to implement integrated business process management (BPM) by using an API-led strategy. Uncover best practices for BPM design and learn how to overcome common BPM challenges, create API-led connectivity through a hybrid integration platform, and more.
Posted: 01 Mar 2017 | Published: 01 Mar 2017

MuleSoft

Best Practices for Microservices
sponsored by MuleSoft
WEBCAST: This webcast explores the concept of microservices, defining what they are, how to implement them, and how to optimize their value. Uncover microservices best practices and learn from a series of experts how to leverage APIs, enable continuous delivery, optimize automation, implement a hybrid integration platform, and more.
Posted: 02 Mar 2017 | Premiered: Feb 10, 2017

MuleSoft

Best Practices to De-risk Your Windows 10 Migration
sponsored by Riverbed Technology, Inc.
WEBCAST: Windows 10 is intended to deliver a unified user experience across all of the devices in your environment, but planning and executing a smooth migration is complex. To get it right, you must validate that app performance, device health, and end user experience are as good or better after upgrading.
Posted: 01 May 2017 | Premiered: Apr 27, 2017

Riverbed Technology, Inc.

ASG-Discovery and Dependency Mapping (ASG-DDM)
sponsored by ASG Software Solutions
WHITE PAPER: This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by DellEMC and Intel®
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®

Automating Processes to Optimize a Windows 7 Deployment
sponsored by Dell, Inc. and Microsoft Windows 7
WHITE PAPER: IDC estimates that the average cost of deployment activities is $527 per PC, but can go as high as $700 or more depending on the time spent by IT staff and users. Reducing the cost of deployment will significantly reduce the total cost of ownership—especially in combination with cost-saving features in Microsoft Windows 7.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Dell, Inc. and Microsoft Windows 7

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Bank Of New Zealand Reduces Carbon Footprint With Red Hat On The Mainframe
sponsored by Red Hat and JBoss
CASE STUDY: Like a large number of businesses in New Zealand and around the world, BNZ was close to reaching capacity in its datacenter and needed to determine how to maximise space while keeping costs down. In this case study we'll see how BNZ handled this and other challenges by migrating to Red Hat Enterprise Linux 5 running under z/VM on the mainframe.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Red Hat and JBoss

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010

CDW

Best practices for migrating from Windows XP to Windows 7
sponsored by Intel
EGUIDE: Upgrades to Windows 7 continue to abound. In fact, the decision to upgrade is often the easiest part -- it is the actual migration itself that is often the most agonizing. Take a look at this expert resource from the editors at SearchEnterpriseDesktop.com for a comprehensive analysis of the Windows 7 migration process.
Posted: 02 Aug 2011 | Published: 01 Aug 2011

Intel

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

BetFair places its odds on Dell
sponsored by Dell, Inc. and Microsoft Windows 7
CASE STUDY: Leading betting company sees performance gains of approximately 20 per cent with Windows 7 implementation from Dell.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Dell, Inc. and Microsoft Windows 7

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop
101 - 125 of 1136 Matches Previous Page    3 4 5 6 7 8    Next Page
 
BOURNE SHELL DEFINITION (continued): …  shells.Bourne Again Shell (Bash) is the free version of the Bourne shell distributed with Linux systems. Bash is similar to the original, but has added features such as command line editing. Its name is sometimes spelled as Bourne Again SHell, the capitalized Hell referring to the difficulty some people have with it. Zsh was developed by Paul Falstad as a replacement for both the Bourne and C shell. It incorporates features of all the other shells (such as file name completion and a history mechanism) as well as new capabilities. Zsh is considered similar to the Korn shell. Falstad intended to … 
Bourne Shell definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement