Hp-Ux Security DevelopmentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hp-Ux Security Development returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Midframe/ Midrange Servers
 •   Mainframe/ High-end Servers
 •   Operating Systems and Subsystems
 •   Index Servers
 •   Enterprise Systems Management
 •   Database Administration
 •   Databases
 •   Search Servers
 •   Application Servers

Related Searches
 •   Access Hp-Ux
 •   All Hp-Ux Security
 •   Calendar Hp-Ux Security
 •   Control Hp-Ux Security Development
 •   Hp-Ux Basic
 •   Hp-Ux Consultancy
 •   Hp-Ux Find
 •   Objectives Hp-Ux Security
 •   Policies Hp-Ux
 •   Risk Hp-Ux Security
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

IBM committed to supporting HP-UX for years to come by IBM

May 19, 2011 - (Free Research)
This blog entry offers advice to help companies choose servers to support their essential databases. Discover how two major vendors compare with respect to their past performance and plans for the future. 
(INFORMATION CENTER) READ ABSTRACT |

Comparing HP-UX 11i v3 and Linux for Hosting Critical Workloads by HP & Intel®

February 16, 2011 - (Free Research)
This white paper presents a technical comparison of HP-UX 11i v3, Red Hat Enterprise Linux 5 (RHEL 5), and SUSE Linux Enterprise Server 11 (SLES 11) operating systems, focusing on their functional capabilities in terms of scalability, virtualization, reliability, and security. 
(WHITE PAPER) READ ABSTRACT |

Migrate from HP-UX and Standardize with Confidence by Red Hat

April 02, 2014 - (Free Research)
This whitepaper explains more about the reasons to migrate to Linux, including increasing hardware choices and moving commodity platforms, as well as why Red Hat Enterprise Linux could be exactly the platform you need. 
(WHITE PAPER) READ ABSTRACT |

HP-UX 11i on Integrity servers: HP value for Solaris users by Hewlett-Packard Limited

January 01, 2010 - (Free Research)
Join HP-UX 11i Marketing Manager Suzanne LaForge as she discusses HP-UX 11i on Integrity servers and HP's value for Solaris users. 
(WEBCAST) READ ABSTRACT |

The Business Value of HP–UX 11i v3 by Hewlett-Packard Limited

March 02, 2010 - (Free Research)
Alinean, a leader in IT value measurement, teamed up with HP to assess the financial merits of moving from a HP-UX 11i v2 platform to HP-UX 11i v3 running on HP Integrity Servers over moving to SUN Solaris10 running on Sun Servers. Read this white paper for details. 
(WHITE PAPER) READ ABSTRACT |

Quantifying the Total Cost of Upgrade (TCU) for HP-UX Environments to HP-UX 11i v3 by HP & Intel®

February 22, 2011 - (Free Research)
This TechWise Research offering gives a detailed analyses of costs and benefits associated with upgrading earlier versions of the HP-UX 11i operating environments to HP-UX 11i v3. 
(WHITE PAPER) READ ABSTRACT |

IBM committed to supporting HP-UX for years to come by IBM

June 07, 2011 - (Free Research)
IBM committed to supporting HP-UX for years to come says Inhi Suh, IBM VP Info Mgmt Product Strategy. 
(WHITE PAPER)

If you love HP Itanium and want to get off Oracle DB, consider IBM DB2 by IBM

May 16, 2011 - (Free Research)
This blog post and video discuss the impact of Oracle's decision not to support upgrades to HP-UX software on today's companies. Explore an alternative to Oracle Database and find out why moving to DB2 may be easier than you think. 
(INFORMATION CENTER) READ ABSTRACT |

Robot/SCHEDULE Enterprise by Help/Systems

September 17, 2009 - (Free Research)
Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease. 
(WEBCAST) READ ABSTRACT |

HP-UX 11i v3 Operating Environments - Simplify UNIX operations with the right package by HP & Intel®

February 21, 2011 - (Free Research)
This data sheet provides expert instructions on how to simplify UNIX operations with the HP-UX 11i. 
(DATA SHEET) READ ABSTRACT |

The Business Value of HP–UX 11i by HP & Intel®

February 16, 2011 - (Free Research)
When HP-UX 11i on Integrity Servers was matched up against Linux on IBM x86 Servers, the results were interesting. Read this paper and find out which lowered TCO and gave higher ROI through superior consolidation, virtualization, scalability, availability, and intelligent manageability. 
(WHITE PAPER) READ ABSTRACT |

HP Integrity BL860c i2 server blade by HP & Intel®

May 03, 2010 - (Free Research)
HP has combined innovation, partnerships, and expertise to deliver the industry’s first mission-critical Converged Infrastructure: new HP Integrity systems, leveraging the industry’s #1 blade platform1 and running HP-UX 11i v3. This data sheet has the details. 
(DATA SHEET) READ ABSTRACT |

Realize the mission-critical Converged Infrastructure of the future  - today - with HP-UX 11i v3 on HP Integrity Servers by HP & Intel®

February 21, 2011 - (Free Research)
This brochure details best practices to eliminate silos and integrate technologies into shared pools of resources to deliver a whole new level of simplicity, integration, and automation. 
(WHITE PAPER) READ ABSTRACT |

With Enhanced POWER7 Systems, IBM Raises the Ceiling, Again by IBM

March 06, 2012 - (Free Research)
This white paper outlines the current marketplace for UNIX systems on specialized architectures, outlining the challenges faced by CIOs who need a reliable vendor for their mission-critical data center. It examines the features and strengths of IBM's AIX on POWER7. 
(WHITE PAPER) READ ABSTRACT |

Effectively Securing Virtualized Data Centers by Apani

November 2008 - (Free Research)
This white paper will examine trends in server virtualization security and reveal the many compelling advantages of cross-platform VM isolation solutions. 
(WHITE PAPER) READ ABSTRACT |

CASE STUDY: CareGroup Healthcare System by Akorri

March 2008 - (Free Research)
BalancePoint is helping CareGroup manage application service levels, allowing the IT team to move away from volumetric capacity planning and turn to scenario modeling and "whatif" planning. 
(CASE STUDY) READ ABSTRACT |

A Security Overview of Adobe Creative Cloud by CDW Corporation

February 2014 - (Free Research)
Product, website and application design teams can now use Adobe Creative Cloud services to reduce licensing costs and access secure versions of Adobe's applications on a subscription basis in the cloud. This resource outlines Adobe's strict security measures around Creative Cloud as well and touches on the storage options and collaboration tools. 
(WHITE PAPER) READ ABSTRACT |

Software Security for Web Developers: Providing a Helping Hand by Imperva

April 2014 - (Free Research)
This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on. 
(EGUIDE) READ ABSTRACT |

Veracode eLearning Subscription by Veracode, Inc.

May 2010 - (Free Research)
Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more. 
(TRAINING GUIDE) READ ABSTRACT |

Application Development: Improving Productivity Among Evolving Application Platforms by ASG Software Solutions

June 2010 - (Free Research)
Join special guest Jeffrey S. Hammond, Principal Analyst at Forrester Research, Inc. and Ian Rowlands from ASG, as they discuss some of the options shops have at their disposal for improving consistency and cross platform governance of your application development efforts 
(WEBCAST) READ ABSTRACT |

Integrating Security into Development, No Pain Required by IBM

April 2012 - (Free Research)
There are substantial security benefits to developers and security personnel working together, yet they are often viewed as being like oil and water. In this paper, discover how to integrate software development and security effectively and pain-free by using the right tools and techniques. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Security is Well Suited for Agile Development by IBM

June 2011 - (Free Research)
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Webcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle. 
(WEBCAST) READ ABSTRACT |

Podcast: How Security is well suited for Agile development by IBM

June 2011 - (Free Research)
Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle. 
(PODCAST) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts