Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

HP-UX

RSS Feed    Add to Google    Add to My Yahoo!
HP-UX Reports
 
Unix to Linux Migration Implementation Tips
sponsored by SearchDataCenter.com
EGUIDE: Access this essential e-guide from our editors to discover how migrating from Unix to Linux platform can increase flexibility while reducing overall licensing costs. Also, get implementation tips for porting, upgrading and testing applications for optimal stability and performance.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

SearchDataCenter.com

Moving from Unix to Red Hat Enterprise Linux: Now is the Time
sponsored by Red Hat
BROCHURE: This informative brochure discusses the current state of UNIX systems and why organizations are migrating their legacy UNIX systems to Linux platforms. Read on to learn the benefits of this migration and how you can help prepare your business for the future.
Posted: 11 Aug 2015 | Published: 29 May 2015

Red Hat

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

IBM Takes Command of the UNIX Data Center - POWER7 Enables Growth, Lower Costs
sponsored by IBM
WHITE PAPER: IBM continues to provide the scale-up UNIX data center with a plan, and a predictable drumbeat, for the future. To learn more about IBM’s forthcoming POWER7 and AIX7, please read on.
Posted: 15 Jun 2010 | Published: 21 Sep 2009

IBM

DB2 10: What's new in DB2 10 for Linux, UNIX, and Windows
sponsored by IBM
WHITE PAPER: Organizations are buzzing about the upcoming release of the latest version of IBM's DB2. The added features and functionalities offered in the new platform offer cost-savings, improved application performance and better productivity. Read this white paper to learn more about the exciting enhancements and how they can benefit your enterprise.
Posted: 25 Apr 2012 | Published: 03 Apr 2012

IBM

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers.
Posted: 02 Mar 2010 | Published: 09 Sep 2009

CA Technologies.

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

The Value of Power VM Workload Partitions: New Virtualization Options in IBM AIX v6.1
sponsored by IBM
WHITE PAPER: This paper examines the flexibility that WPARs offer IT professionals in their virtualized UNIX server environments and review how WPARs are different from other partitioning technologies.
Posted: 18 Jul 2008 | Published: 01 Feb 2008

IBM

IBM Sets Pace in Unix Virtualization
sponsored by IBM
WHITE PAPER: This Gabriel Consulting report research report focuses on the survey results and discusses IBM’s Power Systems virtualization milestones and touches on the implications for the Unix server market.
Posted: 15 Jun 2010 | Published: 16 Jun 2010

IBM

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement