Linux-Based TheWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux-Based The returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Enterprise Systems Management
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Telephony/ CTI/ VOIP
 •   Change and Configuration Management
 •   Firewalls

Related Searches
 •   Directory Linux-Based
 •   Equipment Linux-Based
 •   Example Of Linux-Based
 •   Import Linux-Based
 •   Linux-Based Creation
 •   Linux-Based Tennessee
 •   Linux-Based The Batch
 •   Linux-Based The Demand
 •   Linux-Based The Expert
 •   Production Linux-Based The
Advertisement

ALL RESULTS
1 - 25 of 496 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

A Better Approach to Managing File System Data by EMC Corporation

August 2005 - (Free Research)
File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Website Security with Algorithm Agility by Symantec Corporation

February 2013 - (Free Research)
Read this whitepaper to learn more about algorithm agility, its role in today's security landscape, and how it is helping businesses enhance online security through a more flexible, scalable approach to SSL certification. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Self-Signed SSL Certificates by Symantec Corporation

May 2012 - (Free Research)
Many IT professionals believe that self-signed SSL certificates can help lower security costs. Unfortunately, aside from the certificate itself, there are a number of other costs. This paper uncovers the true total cost of ownership for self-signed SSL certificates and why they are costlier and riskier than working with a trusted security vendor. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Cloud Hosting Provider with Confidence by Symantec Corporation

May 2012 - (Free Research)
This paper uncovers tips for choosing a cloud hosting provider and explores where and when to use cloud solutions, specific issues enterprises should raise with hosting providers before selecting a vendor, and ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence. 
(WHITE PAPER) READ ABSTRACT |

Getting Ahead of the Compliance Curve by Symantec Corporation

May 2012 - (Free Research)
As the number and complexity of compliance mandates continue to grow, organizations struggle to keep up, only meeting requirements in silos using a “checklist” approach. But this reactive approach only leads to more costs, inefficiencies and risk. Read now to uncover a proactive strategy that will help you get ahead of the compliance curve. 
(WHITE PAPER) READ ABSTRACT |

Craft the Right Strategy for Your Enterprise With HP Mobility Solutions by Hewlett-Packard Company

May 2014 - (Free Research)
HP Enterprise Mobility Services can help you build mobile applications that enable you to convert customer interactions into revenue opportunities. Click on the link below to learn more and one of our mobility experts will be in touch shortly to discuss a face to face demo. To reach out to HP directly, please email us at enterprisesolutions@hp.com 
(PRODUCT DEMO) READ ABSTRACT |

Stepping Up the Battle Against Advanced Threats by Trusteer

August 2013 - (Free Research)
Read this white paper which breaks down how application control is going to keep your endpoints secure in this changing IT threat landscape. 
(WHITE PAPER) READ ABSTRACT |

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by Trusteer

December 2012 - (Free Research)
In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Also inside, discover the growing need for effective antimalware – read on to learn more today. 
(WHITE PAPER) READ ABSTRACT |

Data Center Temperature Rise During a Cooling System Outage by Schneider Electric

May 2013 - (Free Research)
Access this resource to uncover practical strategies that will help you manage the drastic temperature rise in your data center during a cooling outage. 
(WHITE PAPER) READ ABSTRACT |

The Debate Over Global Deduplication by SearchDataBackup.com

March 2013 - (Free Research)
Until recently, organizations that wanted to deduplicate their backups were forced to choose between either source or target-based dedupe. But now, global dedupe does both while eliminating bottlenecks. Read now to learn more. 
(EBOOK) READ ABSTRACT |

Virtualization Reaches Beyond the Hypervisor by SearchServerVirtualization

March 2014 - (Free Research)
This expert resource details the importance that management software will have as a deciding factor in which vitualization vendor organizations pick moving forward. 
(EBOOK) READ ABSTRACT |

Backup Apps: State of the Art by SearchStorage.com

January 2013 - (Free Research)
Check out this expert January 2013 Storage Handbook to explore backup apps going into the new year, and get the scoop on cloud backup and DR, snapshots, VM backups and big data protection. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Delivery: The Next Frontier by SearchSecurity.com

February 2014 - (Free Research)
BYOD, plus virtualization and cloud computing, offer IT new ways to address mobile application delivery and mobile device security. A good mobile app plan includes all of them. 
(EBOOK) READ ABSTRACT |

How You Can Build the Best VMware Storage Architecture by Dell, Inc.

July 2013 - (Free Research)
Your virtual servers won't be able to run to the best of their ability if you aren't prepared for the challenges that come with implementing a shared storage system. Read through this e-book to prepare. 
(EGUIDE) READ ABSTRACT |

How to Migrate from BlackBerry Enterprise Server v4.0 or v5.0 by BlackBerry

January 2014 - (Free Research)
This guide explores the benefits of BlackBerry's Enterprise Service 10 and how that solution can be implemented for your organization. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Security Intelligence for Energy and Utilities Companies by IBM

July 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

The Mainframe as a Key Platform for Big Data and Analytics by IBM

February 2014 - (Free Research)
Access the following white IDC research paper to uncover the requirements for a big data implementation and what you can do to successfully address the needs of BDA. 
(WHITE PAPER) READ ABSTRACT |

Integrated Systems for Simpler Application, Platform, and System Management by IBM

October 2013 - (Free Research)
In this comprehensive resource, explore the ins and outs of a pre-integrated system that offers the compute, storage, and networking resources you need to meet the demands of today's complex applications. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of Smarter Computing by IBM

December 2012 - (Free Research)
Access this resource to explore revolutionary approaches to enterprise systems that enable you to create a robust infrastructure that can support the latest tech trends - from cloud computing to virtualization to mobile devices. 
(WHITE PAPER) READ ABSTRACT |

Oracle Unveils High-End Server for Mission-Critical Application by Oracle Corporation

October 2013 - (Free Research)
This webcast introduces Oracle's big memory machine. This high-end enterprise class server delivers in-memory processing, high performance, and increased security with mission-critical reliability, availability and serviceability. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 496 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts