Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >   UNIX  >   UNIX Shells  >  

Bourne Shell

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The Bourne shell is the original UNIX shell (command execution program, often called a command interpreter) that was developed at AT&T. Named for its developer, Stephen Bourne, the Bourne shell is also known by its program name, sh. The shell prompt (character displayed to indicate readiness for input) used is the $ symbol. The Bourne shell family includes the Bourne, Korn shell, bash, and zsh  … 
Definition continues below.
Bourne Shell Reports
76 - 100 of 1113 Matches Previous Page  |  Next Page
Analysis of the Linux Audit System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 31 Aug 2016 | Published: 01 Sep 2016

ComputerWeekly.com

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

Ansible Tower in the Software Development Lifecycle
sponsored by Red Hat
WHITE PAPER: Discover the benefits Ansible Tower offers in the software development lifecycle (SDLC), and take advantage of its flexibility to embed it in existing tools and processes. Read on to centralize your infrastructure and SDLC management with a platform that will enable self-service and improve automated testing.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Red Hat

ANSIBLE를 이용한 CI/CD (CONTINUOUS INTEGRATION AND CONTINUOUS DELIVERY)
sponsored by Red Hat
WHITE PAPER: Ansible은 매우 강력한 오픈 소스 자동화 언어이며, 다른 관리 툴들과 차별화되는 고유한 특징은 구축 및 오케스트레이션 툴이기도 하다는 사실입니다. 많은 측면에서 다양한 자동화 과제에 막대한 생산성 향상을 실현하는 데 그 목적을 두고 있습니다
Posted: 12 Apr 2017 | Published: 12 Apr 2017

Red Hat

Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Application Modernisation: The Essential Guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

An Introductory Breakdown of Trusted Computing
sponsored by Intel
TECHNICAL ARTICLE: This technical article provides an introduction to Trusted computing and its components, and is an comprehensive primer to IT departments evaluating security at the platform level.
Posted: 03 Dec 2009 | Published: 01 Dec 2008

Intel

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst Report: IBM CICS Tools: Discovery and Optimization for the Next Generation by the Branham Group (February 2013)
sponsored by IBM
WHITE PAPER: This independent white paper discusses the challenges that IT departments face in cost and manpower hours. It looks at several tools that have been shown to significantly reduce the time needed to meet those challenges with resultant deep cost benefits.
Posted: 21 Feb 2014 | Published: 01 Jan 2013

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analytics Deliver Good User Experience for DevOps and End-Users
sponsored by CA Technologies
EGUIDE: Analytics can measure user satisfaction with enterprise mobile apps, but what about day-to-day maintenance? Learn from experts which metrics help with heavy lifting, and are more than just a pretty interface.
Posted: 18 Feb 2016 | Published: 14 Feb 2016

CA Technologies

Application Modernization: What you need to know
sponsored by CA Technologies.
EBOOK: In this eBook, experts explore the legacy mainframe applications from a variety of perspectives.
Posted: 14 Nov 2012 | Published: 14 Nov 2012

CA Technologies.

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Architecting Oracle VM Solution with Sun ZFS Storage Appliances and Sun Servers
sponsored by Oracle Corporation
WHITE PAPER: With virtualization and its ability to install multiple operating systems (OSs) and run them independently on a single server, IT can effectively consolidate hundreds of servers while optimizing resources and simplifying the infrastructure. Read this paper to find out so much more.
Posted: 01 Oct 2010 | Published: 01 Sep 2010

Oracle Corporation

Are Software-Defined Data Centers the Next Frontier of Virtualization?
sponsored by Hewlett Packard Enterprise
EGUIDE: The word is out about software-defined data centers, but awareness isn't the same as understanding or acceptance. In this e-guide, Dan Kusnetzky, founder and principal analyst of market research firm Kusnetzky Group LLC, explores the new frontier that is SDDC and prepares you for your potential future.
Posted: 27 Dec 2016 | Published: 23 Dec 2016

Hewlett Packard Enterprise

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

Are You Ready for Economic Bounce Back?
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper examines the concept that preparing for economic recovery is not something that can wait; it is something that businesses should plan for now. It will introduce enterprise application migration strategies that can be considered within any organization and also emphasize the importance of forward thinking and planning in down economy.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

Micro Focus, Ltd

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

ASG-Discovery and Dependency Mapping (ASG-DDM)
sponsored by ASG Software Solutions
WHITE PAPER: This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft
76 - 100 of 1113 Matches Previous Page    2 3 4 5 6 7    Next Page
 
BOURNE SHELL DEFINITION (continued): …  shells.Bourne Again Shell (Bash) is the free version of the Bourne shell distributed with Linux systems. Bash is similar to the original, but has added features such as command line editing. Its name is sometimes spelled as Bourne Again SHell, the capitalized Hell referring to the difficulty some people have with it. Zsh was developed by Paul Falstad as a replacement for both the Bourne and C shell. It incorporates features of all the other shells (such as file name completion and a history mechanism) as well as new capabilities. Zsh is considered similar to the Korn shell. Falstad intended to … 
Bourne Shell definition sponsored by SearchEnterpriseLinux.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement