Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Intel-based UNIX

RSS Feed    Add to Google    Add to My Yahoo!
Intel-based UNIX Reports
 
Open Group technical document: The Single Unix Specification
sponsored by ComputerWeekly.com
WHITE PAPER: This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect.
Posted: 20 Oct 2011 | Published: 25 Oct 2010

ComputerWeekly.com

ITG - Value Proposition for IBM Power Systems: Virtualisation Impact for Enterprise UNIX and Linux Server Infrastructures
sponsored by IBM
WHITE PAPER: This report by industry analyst International Technology Group evaluates how organisations can reduce IT costs by employing IBM Power Systems and PowerVM verses competitive offerings from HP and Sun Microsystems. Cost savings range from 43 to 65% and are based on client data.
Posted: 02 Oct 2009 | Published: 09 Apr 2009

IBM

Managing 21st Century Business and Technology Innovation: Core Banking Transformation with System z
sponsored by IBM
WHITE PAPER: This paper provides practical insights into global best practices and the strategic benefits of core banking transformation through the lens of the CEO, COO and CIO.
Posted: 14 May 2008 | Published: 01 Oct 2007

IBM

KVM - Kernel Based Virtual Machine
sponsored by Red Hat & IBM
WHITE PAPER: The x86 architecture has proven to be the dominate platform in enterprise computing, moving from its humble beginnings in desktop systems to now, powering the large enterprise applications that run businesses across the globe.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Are You Ready for Economic Bounce Back?
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper examines the concept that preparing for economic recovery is not something that can wait; it is something that businesses should plan for now. It will introduce enterprise application migration strategies that can be considered within any organization and also emphasize the importance of forward thinking and planning in down economy.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

Micro Focus, Ltd

Presentation Transcript: An IT Executive’s Guide to Effective Unix Migrations with Dell Services
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure.
Posted: 11 Jan 2010 | Published: 11 Jan 2010

Dell, Inc. and Intel®

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions
sponsored by BeyondTrust Corporation
PRODUCT LITERATURE: This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

A Better Approach to Managing File System Data
sponsored by EMC Corporation
WHITE PAPER: File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data.
Posted: 01 May 2006 | Published: 03 Aug 2005

EMC Corporation

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement