Berkeley UNIX Reports

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

The Advantages of Virtualized Linux for Business-Critical Applications
sponsored by SUSE
WHITE PAPER: This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.
Posted: 18 Apr 2013 | Published: 18 Apr 2013

SUSE

Success Story: Peerless Clothing
sponsored by SUSE
CASE STUDY: Peerless Clothing deployed its SAP* environment on SUSEĀ® Linux Enterprise Server, saving at least $700,000 compared to the cost of a UNIX-based solution. Learn how.
Posted: 25 Oct 2011 | Published: 27 Oct 2011

SUSE

Extend the Monitoring of Distributed Applications with Operations Manager 2007 to Heterogeneous Environments with Jalasoft Xian Io
sponsored by JALASOFT
WHITE PAPER: The Distributed Application Designer allows administrators to graphically define components which make up a service. Underlying is Operations Manager System Definition Model (SDM).
Posted: 10 Mar 2008 | Published: 10 Mar 2008

JALASOFT

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Unix-to-Linux Migration
sponsored by Red Hat & IBM
EGUIDE: This essential guide from SearchEnterpriseLinux.com covers everything you need to know about a Linux migration.
Posted: 13 Oct 2011 | Published: 13 Oct 2011

Red Hat & IBM

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

DeveloperWorks Weekly Newsletter
sponsored by IBM
NEWSLETTER: Welcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

IBM

Modern Infrastructure E-Zine: October 2013
sponsored by TechTarget Data Center
WHITE PAPER: This Modern Infrastructure issue looks at how Azure could surpass Windows Server in importance, the role of Unix platforms in the enterprise, as well as networking and infrastructure technology necessary to run successful BYO-friendly IT shops.
Posted: 01 Oct 2013 | Published: 01 Oct 2013

TechTarget Data Center