Berkeley Source Distribution Reports

Presentation Transcript: Mission-critical Unix Considerations
sponsored by HP & IntelĀ®
PRESENTATION TRANSCRIPT: Unix remains an important platform for critical enterprise applications. This resource explores the staying power of this venerable operating system and details many of the emerging factors that are affecting its use in the data center.
Posted: 20 Jul 2011 | Published: 20 Jul 2011

HP & IntelĀ®

UNIX to Linux Migration Assessment
sponsored by Red Hat
RESOURCE: Explore this in-depth resource to discover how the migration to Linux impacts organizations, as well as information about other ways to remove cost and complexity from IT infrastructures.
Posted: 02 Apr 2014 | Published: 31 Dec 2010

Red Hat

Virtualizing Enterprise SAP Software Deployments
sponsored by SUSE
WHITE PAPER: Because SAP systems are critical to business operations, companies must ensure that they remain consistently available. This white paper explains how you can leverage virtualization to consolidate SAP servers without compromising the reliability of these crucial applications.
Posted: 18 Jun 2012 | Published: 01 Jun 2011

SUSE

Comparing Virtualization Methods for Business
sponsored by IBM.
WEBCAST: This webcast compares the business impact of virtualization on three available platforms, x86, unix and zEnterprise.
Posted: 12 Nov 2013 | Premiered: Oct 23, 2013

IBM.

DeveloperWorks Weekly Newsletter
sponsored by IBM
NEWSLETTER: Welcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

IBM

Getting Started on a Unix-To-Linux Migration
sponsored by Red Hat
EGUIDE: In this expert e-guide, learn how to make the migration less complex and more fun. From starting your migration with a thorough assessment to examining the code and determining the system administration functions.
Posted: 09 May 2014 | Published: 09 May 2014

TOPICS:  Linux | UNIX
Red Hat

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Unix-to-Linux Migration
sponsored by TechTarget Data Center
EGUIDE: Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.
Posted: 29 Mar 2011 | Published: 29 Mar 2011

TechTarget Data Center

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos