Intel-based UNIX Reports

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Unix to Linux Migration Tips: Overcome Common Challenges
sponsored by Red Hat & IBM
EGUIDE: Access this expert resource to discover how to overcome common migration challenges, with respect to hardware and availability issues. Also learn how the New York Stock Exchange benefitted from a Unix-to-Linux migration to keep up with demanding business transactions with minimal downtime.
Posted: 20 Jun 2011 | Published: 20 Jun 2011

Red Hat & IBM

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

ASG-Discovery and Dependency Mapping (ASG-DDM)
sponsored by ASG Software Solutions
WHITE PAPER: This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

ASG Software Solutions

SAP platform showdown
sponsored by IBM
WHITE PAPER: In this informative study, find out the real-word impact of deploying SAP on IBM's Power platforms, as opposed to SAP on HP x86, Dell x86 and HP Itanium, all running with Oracle DB.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Harmonizing the Twin Trends of Open Source and Virtualization: How Kernel Based Virtual Machine (KVM) Drives Enterprise Business Value
sponsored by Red Hat & IBM
WHITE PAPER: In the 1960s, computers housed in data centers were few in number and this resource was very expensive. As a result utilization of those compute resources was kept very high. In order to optimize the utilization of those...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

IBM Sets Pace in Unix Virtualization
sponsored by IBM
WHITE PAPER: This Gabriel Consulting report research report focuses on the survey results and discusses IBM’s Power Systems virtualization milestones and touches on the implications for the Unix server market.
Posted: 15 Jun 2010 | Published: 16 Jun 2010

IBM

Red Hat Provides CEPSA with a Scalable, Standardized, High-Availability SAP Platform
sponsored by Red Hat - HPE
WHITE PAPER: Access this exclusive study to learn how an energy company improved SAP platform response time, reduced infrastructure costs and built a standardized, scalable platform with high availability by switching to standard servers running on in a Linux environment.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

Verizon Communications Red Hat Innovation Award Winner Optimized Systems
sponsored by Red Hat - HPE
WHITE PAPER: Access this exclusive paper to discover how communication giant Verizon migrated to Linux and reduced costs, improved performance, increased scalability and improved energy conservation.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE