Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >  

Irix

RSS Feed    Add to Google    Add to My Yahoo!
Irix Reports
 
KVM - Kernel Based Virtual Machine
sponsored by Red Hat & IBM
WHITE PAPER: The x86 architecture has proven to be the dominate platform in enterprise computing, moving from its humble beginnings in desktop systems to now, powering the large enterprise applications that run businesses across the globe.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

ITG - Value Proposition for IBM Power Systems: Virtualisation Impact for Enterprise UNIX and Linux Server Infrastructures
sponsored by IBM
WHITE PAPER: This report by industry analyst International Technology Group evaluates how organisations can reduce IT costs by employing IBM Power Systems and PowerVM verses competitive offerings from HP and Sun Microsystems. Cost savings range from 43 to 65% and are based on client data.
Posted: 02 Oct 2009 | Published: 09 Apr 2009

IBM

Presentation Transcript: Why Enterprises Can’t Afford to NOT Use UNIX for Business-Critical Systems
sponsored by HP & Intel®
PRESENTATION TRANSCRIPT: Companies that use UNIX for business critical systems find value in its reliability, stability and memory management. Learn how not using UNIX can affect the performance and reliability of your business critical systems.
Posted: 24 Aug 2010 | Published: 23 Aug 2010

HP & Intel®

Sony Life Safeguards Data on More than 4.4 Million Customers with CA Access Control
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how CA Access Control has allowed Sony Life to improve the level of security surrounding its servers.
Posted: 02 Mar 2010 | Published: 09 Sep 2009

CA Technologies.

Data Center Modernization: 8 Best Practices for Unix to Linux Migration
sponsored by Dell, Inc.
WHITE PAPER: This white paper explains why many companies are replacing their proprietary hardware and software with x86-based servers running Linux. Access best practices to help you effectively plan your migration and ensure a smooth transition.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

Dell, Inc.

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation

Linux Made Easy: Migrating From Unix
sponsored by Red Hat & IBM
WHITE PAPER: Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Migrating from Solaris to SUSE® Linux Enterprise Server
sponsored by SUSE
WHITE PAPER: Access this white paper to discover real-world examples of top businesses that have benefitted from Linux migration. Learn more about this ever-growing migration trend.
Posted: 04 May 2012 | Published: 04 May 2012

SUSE

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved.
Posted: 19 Oct 2010 | Published: 19 Oct 2010

Mainline Information Systems

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement