Access LinuxWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Access Linux returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Enterprise Systems Management
 •   Data Center Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Open Source
 •   Migration Tools and Services
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Legacy Systems Analysis and Upgrade
 •   Application Servers

Related Searches
 •   Access Databases
 •   Access Linux Articles
 •   Access Linux Case Studies
 •   Access Linux Related
 •   Access Procedure
 •   Customer Access Linux
 •   Databases Access Linux
 •   Measure Access Linux
 •   Statistics Access Linux
Advertisement

ALL RESULTS
1 - 25 of 486 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET

March 25, 2011 - (Free Research)
ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

ESET File Security for Linux/BSD/Solaris by ESET

August 03, 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

Unix to Linux Migration Tips: Overcome Common Challenges by Red Hat & IBM

June 20, 2011 - (Free Research)
Access this expert resource to discover how to overcome common migration challenges, with respect to hardware and availability issues. Also learn how the New York Stock Exchange benefitted from a Unix-to-Linux migration to keep up with demanding business transactions with minimal downtime. 
(EGUIDE) READ ABSTRACT |

Unix to Linux Migration Implementation Tips by Mainline Information Systems

June 27, 2011 - (Free Research)
Access this essential e-guide from our editors to discover how migrating from Unix to Linux platform can increase flexibility while reducing overall licensing costs. Also, get implementation tips for porting, upgrading and testing applications for optimal stability and performance. 
(EGUIDE) READ ABSTRACT |

Linux Best Management Practices by Red Hat and HP

July 16, 2012 - (Free Research)
Access this white paper to learn about the newest HP ProLiant Gen8 Agentless Management system, which provides customers with core management functions for internal systems components, including health monitoring and alerting. 
(WHITE PAPER) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

SUSE Linux Enterprise for Server Data Sheet by SUSE

June 2012 - (Free Research)
This white paper presents a high-performance Linux server that cost-effectively delivers critical business services. Learn how your organization can achieve benefits like lower server infrastructure software costs, faster updating and more. 
(WHITE PAPER) READ ABSTRACT |

Integrating Unix and Linux Systems with Active Directory by Dell Software

October 2009 - (Free Research)
Microsoft Active Directory has always proven ideal in providing secure access of users to all systems in an enterprise using the Windows platform. Unfortunately, by itself, AD can't provide the same level of security, compliance, and scalability to Unix, Linux, and Java systems. Quest Software can bridge that gap. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by Hewlett-Packard Company

December 2007 - (Free Research)
This white paper reviews proof points and best practices for file sharing disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

IDC: Linux in the Mainstream: Growing Deployment of Business-Critical Workloads by Red Hat & IBM

September 2011 - (Free Research)
Access this resource to explore the growth of Linux as a server operating system and discover how deployment form factors have changed over time to support both workload data and the ecosystem. 
(WHITE PAPER) READ ABSTRACT |

Controlling, Delegating, Logging and Auditing Unix/Linux Root Actions by BeyondTrust Corporation

February 2009 - (Free Research)
This document discusses the use of PowerBroker software to address some of the security and audit problems inherent in native UNIX and Linux operating systems. The purpose of the document is to demonstrate the value of PowerBroker as a tool for reducing risk in environments where information security and risk avoidance are considered important. 
(ARTICLE) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

Enhancing CygNet OTNMS* performance with Red Hat Enterprise Linux* & Intel® Xeon® Processor-based Servers by Red Hat and Intel

December 2013 - (Free Research)
This case study examines how Red Hat Enterprise Linux combined with Intel Xeon helped India-based company NMSWorks achieve faster and more efficient data processing. 
(CASE STUDY) READ ABSTRACT |

Why Linux Virtualization is Ready for Prime Time by Red Hat and HP

September 2012 - (Free Research)
Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition. 
(WHITE PAPER) READ ABSTRACT |

Migrating from Solaris to SUSE® Linux Enterprise Server by SUSE

May 2012 - (Free Research)
Access this white paper to discover real-world examples of top businesses that have benefitted from Linux migration. Learn more about this ever-growing migration trend. 
(WHITE PAPER) READ ABSTRACT |

Modern Mainframe Management Challenges E-Book: Running New Workloads like Linux by CA Technologies.

February 2011 - (Free Research)
Access this e-book to learn the best ways to use mainframes for running new workloads such as those associated with the Linux operating system and assess the TCO evidence that the mainframe can now be a low-cost platform for workloads. 
(EBOOK) READ ABSTRACT |

IBM System x and BladeCenter Running Red Hat Enterprise Linux by Red Hat & IBM

June 2011 - (Free Research)
This white paper describes how running Red Hat Enterprise Linux and IBM System x together can dramatically transform your organization into a faster and more resilient enterprise. Learn how this platform will evolve your IT strategy and minimize your total cost of ownership (TCO). 
(WHITE PAPER) READ ABSTRACT |

Success Story: Peerless Clothing by SUSE

October 2011 - (Free Research)
Peerless Clothing deployed its SAP* environment on SUSE® Linux Enterprise Server, saving at least $700,000 compared to the cost of a UNIX-based solution. Learn how. 
(CASE STUDY) READ ABSTRACT |

Presentation transcript: How New Red Hat Solutions Will Change your Business - News From the Red Hat Summit 2012 by Red Hat

August 2012 - (Free Research)
Access this presentation transcript for highlights from the exciting Red Hat Summit and JBoss World 2012 events in Boston – and for insight into the topics covered in the 150+ sessions on offer - from cloud strategy and development tools, to cost savings, performance analysis and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Fabbrica Automatismi Apertura Cancelli Story by SUSE

June 2012 - (Free Research)
Access this white paper to learn how one company migrated from its legacy IBM i platform to Linux which reduced costs, improved performance and simplified system management processes. Discover how your organization can achieve similar benefits as well as improve response time and reduce workloads. 
(WHITE PAPER) READ ABSTRACT |

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers by Red Hat and HP

April 2013 - (Free Research)
Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity. 
(WHITE PAPER) READ ABSTRACT |

DreamWorks Animation Utilizes the Red Hat Portfolio to Build a Private Cloud by Red Hat and HP

July 2012 - (Free Research)
Access this white paper to discover how one leading animation studio uses Linux to enable rapid and cost-efficient scalability of computing and resources for high-performance compute (HPC) workloads. Learn how your organization can reduce your data center footprint and enhance reliability by using this Linux platform. 
(WHITE PAPER) READ ABSTRACT |

Identity Access Management for Windows Environments by Centrify Corporation

February 2013 - (Free Research)
In this e-guide learn about new tools that are expanding identity access management beyond the corporate firewall to help you better manage mobile device and cloud apps as well as some Windows networking identity basics to integrate Windows desktops and Linux servers into Active Directory. 
(EGUIDE) READ ABSTRACT |

Ericom Desktop Virtualization Solutions by Ericom Software

Ericom virtualization solutions enable you to administer virtual desktops from a centralized location, reducing the cost and complexity of virtual desktop deployment and upkeep. Supported virtualization servers include VMware, Microsoft and others. 
(SOFTWARE PRODUCT)

1 - 25 of 486 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts