Ultrix Reports

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

RedBook: Oracle to DB2 Conversion Guide - Compatibility Made Easy
sponsored by IBM
WHITE PAPER: New IBM DB2 features make compatibility easy. In this guide, you’ll learn about native support for PL/SQL, new data types, scalar functions, improved concurrency, built-in packages, OCI, SQL*Plus, data movement tools, best practices and more—all designed to improve your ability to run applications on both DB2 and Oracle platforms
Posted: 01 Sep 2010 | Published: 01 Sep 2010

IBM

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Success Story: Peerless Clothing
sponsored by SUSE
CASE STUDY: Peerless Clothing deployed its SAP* environment on SUSE® Linux Enterprise Server, saving at least $700,000 compared to the cost of a UNIX-based solution. Learn how.
Posted: 25 Oct 2011 | Published: 27 Oct 2011

SUSE

DreamWorks Animation Utilizes the Red Hat Portfolio to Build a Private Cloud
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover how one leading animation studio uses Linux to enable rapid and cost-efficient scalability of computing and resources for high-performance compute (HPC) workloads. Learn how your organization can reduce your data center footprint and enhance reliability by using this Linux platform.
Posted: 16 Jul 2012 | Published: 16 Jul 2012

Red Hat - HPE

Getting Started on a Unix-To-Linux Migration
sponsored by Red Hat
EGUIDE: In this expert e-guide, learn how to make the migration less complex and more fun. From starting your migration with a thorough assessment to examining the code and determining the system administration functions.
Posted: 09 May 2014 | Published: 09 May 2014

TOPICS:  Linux | UNIX
Red Hat

E-Book: Unix-to-Linux Migration: A step-by-step approach for data center managers that covers everything from making the business case to getting the best training
sponsored by Red Hat & IBM
EBOOK: When migrating from  Unix to Linux, the most important case you will need to make is not a technical case but a business case. It’s all about the bottom line. How will the business benefit by moving over? What is the total cost of ownership and return on investment for the migration? Read on to learn more!
Posted: 08 Dec 2010 | Published: 08 Dec 2010

Red Hat & IBM

Moving From Solaris To Red Hat Enterprise Linux
sponsored by Red Hat - HPE
WHITE PAPER: Red Hat® Enterprise Linux® is a standards-based UNIX®-like operating system that provides a development environment similar to SunTM SolarisTM. This paper looks to highlight some of the major differences between Solaris and Red Hat Enterprise Linux to help application developers port their code.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat - HPE

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation