Linux Cluster Management AccountingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux Cluster Management Accounting returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Enterprise Systems Management
 •   Systems Integration
 •   Data Security
 •   Virtualization
 •   Database Planning and Implementation
 •   Database Administration
 •   Clustering
 •   Databases
 •   Operating Systems and Subsystems

Related Searches
 •   Control Linux Cluster Management
 •   Example Linux Cluster
 •   Linux Cluster Consulting
 •   Linux Cluster Intrastructures
 •   Linux Cluster Strategic
 •   Linux Implementing
 •   Linux Supply
 •   Standards Linux Cluster
 •   Us Linux Cluster
 •   What Is Linux Cluster
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Platform HPC Workgroup Manager: Simplified Management of High-Performance Computing Clusters by Platform Computing Corporation

September 01, 2009 - (Free Research)
This paper provides an overview of Platform HPC Workgroup Manager (HPC-WM). HPC-WM dramatically simplifies both the installation and ongoing management of Linux clusters, making them accessible to even the smallest organizations. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by Hewlett-Packard Company

December 2007 - (Free Research)
This white paper reviews proof points and best practices for file sharing disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

High Availability Add-On for Red Hat Enterprise Linux on HP ProLiant Servers by Red Hat and HP

March 2012 - (Free Research)
This white paper describes a Linux architecture designed to help companies maximize availability. Learn more about the technical components of this configuration and how you can ensure that it is successfully implemented. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Mission-critical Unix Considerations by HP & Intel®

July 2011 - (Free Research)
Unix remains an important platform for critical enterprise applications. This resource explores the staying power of this venerable operating system and details many of the emerging factors that are affecting its use in the data center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Oracle Exalogic Elastic Cloud: System Overview by Oracle Corporation

September 2011 - (Free Research)
Read this white paper to learn about Oracle Exalogic Elastic Cloud, an Engineered System consisting of software, firmware, and hardware designed to meet the highest standards of reliability, serviceability and performance. 
(WHITE PAPER)

A foundation for database simplification, consolidation and cost reduction by IBM

February 2012 - (Free Research)
This white paper challenges the x86 processor trend, demonstrating that modern mainframe technology represents a scale-up option to the current racks filled with blades. It looks at the way organizations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise. 
(WHITE PAPER) READ ABSTRACT |

A Bathwick Group white paper: A foundation for database simplification, consolidation and cost reduction by IBM

November 2011 - (Free Research)
This white paper challenges several assumptions about scale-out architectures and explains how consolidation and virtualisation can help you regain control over your infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The Oracle Database Administrator of Tomorrow: The Impact of New Technologies by Dell Software

June 2008 - (Free Research)
As new technologies become more widely adopted, your role as a database administrator (DBA) will change. This paper outlines the common challenges you face, the critical tasks you perform, and examines the trends will impact your role as a DBA. 
(WHITE PAPER) READ ABSTRACT |

ESET File Security for Linux/BSD/Solaris by ESET

August 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

Two Billion Entry Directory Benchmark by Oracle Corporation

April 2008 - (Free Research)
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Tightening Down Your Linux Security by Trusted Computer Solutions

April 2010 - (Free Research)
Read this expert presentation transcript to learn about some of the most prevalent security risks to Linux environments today. Gain insight into network devices beyond the server system that need security protection. Discover how to tighten your Linux security and minimize long-term information risks. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Achieving PCI Compliance with Red Hat Enterprise Linux by Red Hat and JBoss

August 2009 - (Free Research)
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS Compliance in the UNIX/Linux Datacenter Environment by BeyondTrust Corporation

February 2009 - (Free Research)
Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization. 
(WHITE PAPER) READ ABSTRACT |

Deployment Framework Best Practices by Red Hat and HP

March 2012 - (Free Research)
This white paper examines various Linux configuration and deployment options. Discover key installation considerations to take into account and obtain best practices to help you execute your implementation with ease. 
(WHITE PAPER) READ ABSTRACT |

Dell: Expanding Its Position as an HPC Market Leader by Dell, Inc. and Intel®

April 2011 - (Free Research)
With several offerings available, choosing the ideal high performance computing (HPC) offering for your business can be a daunting task. This resource examines one well-reputed HPC vendor and explains how it differentiates itself in the competitive marketplace. 
(WHITE PAPER)

Implementing Breakthrough Technology for Clinical Development Modeling and Simulation by Univa UD

April 2008 - (Free Research)
When GlaxoSmithKline was challenged with improving efficiency in modeling and simulation, their clinical development research team turned to Univa technology for faster methods of establishing and running models for a drug’s effects on the body. 
(CASE STUDY) READ ABSTRACT |

Virus Bulletin: Comparative Reviews in 2010 by ESET

June 2010 - (Free Research)
This paper shows you the latest news about the VB100 testing, Linux Enterprise Server 11, Windows XP SP3, Windows Server 2008 R2 and so much more. 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

SecurStor 12000/16000 RAID by Excel Meridian Data, Inc.

SecurStor 12000/16000 RAID series are high performance cost effective IDE-to- Ultra160 SCSI or 2 Gb Fibre RAID solutions for workgroups, departmental or LAN storage needs. Scalable from 80 GB to 4TB with up-to (16) IDE hard disk drives. 
(HARDWARE PRODUCT)

Audit Tracking & SOX Compliance by RevSoft

September 2008 - (Free Research)
Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked. 
(WHITE PAPER) READ ABSTRACT |

Choosing the Right Active Directory Bridge Solution by Dell Software

February 2011 - (Free Research)
This Quest Software white paper helps you understand the questions to ask when choosing the best Active Directory solution for your company. Don’t waste any more time and money with systems that don’t play well together! Read this Quest white paper today. 
(WHITE PAPER) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Root Access Control by BeyondTrust Corporation

May 2009 - (Free Research)
Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Effective Log Management for the IBM Power Systems (i, AIX, Linux) by Safestone Technologies

October 2010 - (Free Research)
This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts