IBM AIX Reports

Intrado Builds Smarter, Stronger 9-1-1 Infrastructure with HP Integrity Servers
sponsored by Hewlett Packard Enterprise
CASE STUDY: Read this case study and learn how Intrado introduced a dynamic, Internet Protocol, based 9-1-1 environment that can be upgraded through software downloads to meet these challenges.
Posted: 16 Mar 2007 | Published: 01 Aug 2005

Hewlett Packard Enterprise

Unix-to-Linux Migration
sponsored by Red Hat & IBM
EGUIDE: This essential guide from SearchEnterpriseLinux.com covers everything you need to know about a Linux migration.
Posted: 13 Oct 2011 | Published: 13 Oct 2011

Red Hat & IBM

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows
sponsored by IBM
WHITE PAPER: Use this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs.
Posted: 17 Jun 2008 | Published: 01 Jan 2008

IBM

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Modern Infrastructure E-Zine: October 2013
sponsored by TechTarget Data Center
WHITE PAPER: This Modern Infrastructure issue looks at how Azure could surpass Windows Server in importance, the role of Unix platforms in the enterprise, as well as networking and infrastructure technology necessary to run successful BYO-friendly IT shops.
Posted: 01 Oct 2013 | Published: 01 Oct 2013

TechTarget Data Center

Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation

DreamWorks Animation Utilizes the Red Hat Portfolio to Build a Private Cloud
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover how one leading animation studio uses Linux to enable rapid and cost-efficient scalability of computing and resources for high-performance compute (HPC) workloads. Learn how your organization can reduce your data center footprint and enhance reliability by using this Linux platform.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Red Hat - HPE

ASG-Discovery and Dependency Mapping (ASG-DDM)
sponsored by ASG Software Solutions
WHITE PAPER: This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.
Posted: 23 Feb 2010 | Published: 23 Feb 2010

ASG Software Solutions

DeveloperWorks Weekly Newsletter
sponsored by IBM
NEWSLETTER: Welcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

IBM