Linux PreventiveWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux Preventive returned the following results.
RSS What is RSS?
Related Categories

 •   Operating Systems and Subsystems
 •   Data Center Management
 •   Enterprise Systems Management
 •   Migration Tools and Services
 •   Open Source
 •   Virtualization
 •   Availability, Performance and Problem Management
 •   Data Security
 •   Application Management and Maintenance
 •   Application Servers

Related Searches
 •   Creation Linux
 •   Download Linux Preventive
 •   Facts Linux
 •   Linux Computers
 •   Linux Preventive New Hampshire
 •   Linux Preventive Price
 •   Linux Preventive Rhode Island
 •   Office Linux Preventive
 •   Orders Linux
 •   Tracking Linux
Advertisement

ALL RESULTS
1 - 25 of 426 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Preventive Maintenance Strategy for Data Centers by APC by Schneider Electric

February 2009 - (Free Research)
This white paper describes the types of PM services that can help safeguard the uptime of data centers and IT equipment rooms. 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2012 - (Free Research)
<p>To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.</p> 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2011 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

 Five tips to reduce risk from modern web threats by Sophos, Inc.

October 2010 - (Free Research)
User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible. 
(WHITE PAPER) READ ABSTRACT |

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

Strategies for Supporting Next-generation Networks: Proactive, Predictive & Preventive by Alcatel-Lucent

August 2008 - (Free Research)
This white paper dimensions the two-stage evolution from today's prevalent product level support model to network-level support and ultimately to service-level support. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It by Symantec Corporation

August 2009 - (Free Research)
This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in. 
(WHITE PAPER) READ ABSTRACT |

Web security buyers guide by Sophos, Inc.

October 2010 - (Free Research)
A new approach to web security and control is required that supports the needs of businesses, equipping users with the tools they need to be more effective while eliminating the risks of potential infection from trusted legitimate sites. In addition to good preventive practices it is vital that organizations implement a comprehensive solution. 
(WHITE PAPER) READ ABSTRACT |

Security-In-Depth Using Integrated Risk-Conscious Controls by Tripwire, Inc.

December 2011 - (Free Research)
This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Data Breach - Why Breaches Happen and What to Do About It by Symantec Corporation

August 2010 - (Free Research)
This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action. 
(WHITE PAPER) READ ABSTRACT |

IFS Enterprise Asset Management - EAM / CMMS by IFS

IFS Enterprise Asset Management (EAM) is an information management system that connects all departments and disciplines within a company, making them an integrated unit. 
(SOFTWARE PRODUCT)

VMware vCenter Site Recovery Manager 5: Simple, Reliable DR for All Virtualized Applications by VMware, Inc.

February 2012 - (Free Research)
VMware vCenter™ Site Recovery Manager 5 is the market-leading disaster recovery product that addresses this situation for organizations of all kinds. It complements VMware vSphere to ensure the simplest and most reliable disaster protection for all virtualized applications. 
(WEBCAST) READ ABSTRACT |

CW+: Analyst's take: Benefits of Siemens product lifecycle management software for life sciences by ComputerWeekly.com

January 2011 - (Free Research)
Siemens product lifecycle management (PLM) Software for life sciences can help medical device manufacturers manage compliance requirements while supporting greater collaboration, ultimately reducing costs while improving patient outcomes. 
(WHITE PAPER) READ ABSTRACT |

Dell Compellent Storage Center - Linux by Dell, Inc.

April 2012 - (Free Research)
This white paper provides an overview of specific information required for administrating storage on Linux servers connected to the Dell Compellent Storage Center. The information is intended for administrators with at minimum a basic understanding of Linux systems, specifically general tasks around managing disk partitions and file systems. 
(WHITE PAPER) READ ABSTRACT |

Endress+Hauser maximizes availability and resiliency with Linux on System z by IBM

June 2011 - (Free Research)
Because downtime can have serious implications, it is critical that companies have an effective disaster recovery (DR) strategy in place. This case study compares several DR architectures and discusses how one organisation successfully navigated the selection process. 
(WHITE PAPER) READ ABSTRACT |

Deployment Framework Best Practices by Red Hat and HP

March 2012 - (Free Research)
This white paper examines various Linux configuration and deployment options. Discover key installation considerations to take into account and obtain best practices to help you execute your implementation with ease. 
(WHITE PAPER) READ ABSTRACT |

Taking a Proactive Approach to Linux Server Patch Management by SearchDataCenter.com

December 2012 - (Free Research)
In this white paper, discover how to take a proactive approach to Linux server patch management. Learn more about overcoming common challenges for Linux server patch management, what to patch and when, patch management in the cloud and more. 
(WHITE PAPER) READ ABSTRACT |

Expert Strategies for Making a Unix-to-Linux Business Case by SearchDataCenter.com

October 2012 - (Free Research)
Access this expert e-guide and discover how to make the business case for your Unix-to-Linux migration. Learn how to clearly outline Unix limitations and what benefits will be achieved with Linux. 
(EGUIDE) READ ABSTRACT |

Unix-to-Linux Migration by SearchDataCenter.com

March 2011 - (Free Research)
Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more. 
(EGUIDE) READ ABSTRACT |

Expert Best Practices: Using Linux for Data Center Consolidation by SearchDataCenter.com

October 2012 - (Free Research)
Access this expert e-guide for the top advantages of using Linux in a data center consolidation project. Learn how using Linux can help you more effectively reduce cooling costs, reduce real estate footprint and improve server workload utilization. 
(EGUIDE) READ ABSTRACT |

Unix to Linux migrations: How to overcome pitfalls while increasing ROI by SearchDataCenter.com

August 2012 - (Free Research)
In this expert e-guide, discover how your organization can get the most value from a UNIX to Linux migration and overcome common pitfalls. This resource presents top considerations for making the switch and how you can evaluate the potential ROI of a UNIX to Linux migration. 
(EGUIDE) READ ABSTRACT |

Unix to Linux Migration Implementation Tips by SearchDataCenter.com

June 2011 - (Free Research)
Access this essential e-guide from our editors to discover how migrating from Unix to Linux platform can increase flexibility while reducing overall licensing costs. Also, get implementation tips for porting, upgrading and testing applications for optimal stability and performance. 
(EGUIDE) READ ABSTRACT |

Unix-to-Linux Migrations Handbook by SearchDataCenter.com

July 2012 - (Free Research)
This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer. 
(WHITE PAPER) READ ABSTRACT |

Linux in the Mainstream: Highlighting Customers Running Their Business on Red Hat Enterprise Linux by Red Hat

January 2013 - (Free Research)
This IDC whitepaper presents three case studies of customers using Linux for large deployment, business-critical applications. 
(WHITE PAPER) READ ABSTRACT |

5 Things You Thought You Knew About Linux Virtualization by Red Hat

December 2013 - (Free Research)
This video presentation discusses how IT can improve the decisions they make about Linux virtualization. 
(VIDEO) READ ABSTRACT |

1 - 25 of 426 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts