Linux-Based UseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Linux-Based Use returned the following results.
RSS What is RSS?
Related Categories

 •   Open Source
 •   Enterprise Systems Management
 •   Availability, Performance and Problem Management
 •   Data Center Management
 •   Authentication / Password Management
 •   Virtualization
 •   Application Management and Maintenance
 •   Telephony/ CTI/ VOIP
 •   Change and Configuration Management
 •   Firewalls

Related Searches
 •   Infrastructure Linux-Based Use
 •   Linux-Based Skills
 •   Linux-Based Use E-Commerce
 •   Linux-Based Use Maine
 •   Linux-Based Use Strategic
 •   Linux-Based Use Technology
 •   Migration Linux-Based Use
 •   Networking Linux-Based Use
 •   Server Linux-Based Use
 •   Types Linux-Based
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Optimizing IT Service Delivery: The Need for Linux System Management by Red Hat and JBoss

September 03, 2009 - (Free Research)
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software. 
(WHITE PAPER) READ ABSTRACT |

7 Things Every System Administrator Should Know about OpenSSH by Global Knowledge

December 2008 - (Free Research)
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora. 
(WHITE PAPER) READ ABSTRACT |

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Solaris to Linux - Six-Step Migration Guide by Mainline Information Systems

October 2010 - (Free Research)
If you are considering a migration from Sun Solaris to Linux-based systems, we would like to help you understand how a migration would impact your environment.  In six steps, Ryan Hagen, Solutions Architect for Mainline Information Systems™, will show you how a successful migration is achieved. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

A Better Approach to Managing File System Data by EMC Corporation

August 2005 - (Free Research)
File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data. 
(WHITE PAPER) READ ABSTRACT |

FC or FCoE: Choosing the Right Enterprise Storage Networking Option by Brocade

February 2014 - (Free Research)
This white paper gives research results of testing of Fibre Channel connectivity between blade servers and solid-state storage compared to using Fibre Channel over Ethernet. This research, from Evaluator Group, looks at performance, ease of use and availability. 
(WHITE PAPER) READ ABSTRACT |

Detecting the use of TrueCrypt by ComputerWeekly.com

April 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Licensing Windows desktop operating system for use with virtual machines by Dell and Microsoft

November 2013 - (Free Research)
This licensing brief is an overview of the Microsoft Volume Licensing use rights for the Windows 8.1operating system when running within virtual machines. 
(WHITE PAPER) READ ABSTRACT |

Top Use Cases for Desktop Virtualization by Citrix

November 2013 - (Free Research)
This whitepaper outlines the top use cases for desktop virtualization and how it can help address the biggest pain points affecting IT today. 
(WHITE PAPER) READ ABSTRACT |

Why Java Exploits Remain a Top Security Risk by Websense

December 2013 - (Free Research)
Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both. 
(WHITE PAPER) READ ABSTRACT |

Airport's Common Use Model Relies on Modular Switches by Cisco Systems, Inc.

January 2009 - (Free Research)
Read how the Greater Toronto Airports Authority adopted Cisco Catalyst 6500 switches in the wiring closet and throughout the network to enable the convergence of data, voice, and video, and provide virtualization to support a Common Use environment. 
(CASE STUDY) READ ABSTRACT |

Backup and Recovery for VMware using EMC Data Domain Deduplication Storage – Best Practices Planning by EMC Backup and Recovery Solutions

August 2010 - (Free Research)
This paper provides general information for using EMC Data Domain deduplication storage to back up VMs using VMware Consolidated Backup (VCB) with VMware Infrastructure 3(VI3). 
(WHITE PAPER) READ ABSTRACT |

Using Policy Based Routing and Access Control Lists in a Virtualized Network by Dell, Inc.

December 2013 - (Free Research)
Explore this informative white paper to discover what's involved in configuring and applying PBR, user scenarios and much more. 
(WHITE PAPER) READ ABSTRACT |

Improve Organizational Communications by Cisco Systems, Inc.

October 2011 - (Free Research)
As an organization’s workforce becomes increasingly mobile and dispersed, its ability to survive and thrive depends on effective employee communications. Learn about a collaboration platform that allows for improved employee communication and productivity. 
(WHITE PAPER)

Airports Use Network Virtualization to Consolidate and Scale Operations by Cisco Systems, Inc.

January 2009 - (Free Research)
The Cisco Catalyst 6500 Series Switch with Supervisor Engine 720-3BXL enabled Unique at Zurich Airport to successfully implement network virtualization using MPLS VPN technology. 
(CASE STUDY) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Getting the Most Out of Your Next-Generation Firewall by Cisco (E-mail this company)

April 2013 - (Free Research)
This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it. 
(WHITE PAPER) READ ABSTRACT |

Measuring the Total Economic Impact of Content Delivery Using Adobe Flash Media Server by Limelight Networks, Inc.

October 2009 - (Free Research)
This study provides a framework for evaluating the potential financial impact of investing in a media streaming platform. By reviewing the calculations and assumptions used in Forrester's multi-company analysis, readers can better understand and communicate a business case for increasing their investment. 
(WHITE PAPER) READ ABSTRACT |

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls by Cisco (E-mail this company)

May 2013 - (Free Research)
This whitepaper details the trouble modern firewalls have with protecting your data from modern threats and offers a next-generation solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

SSG Report: Dell #1 Vendor of Choice for SSDs by Dell, Inc.

December 2013 - (Free Research)
This report delves into the use cases where solid state storage has tremendous performance advantages and can produce reduced costs due to performance or enable applications that have been near to impossible using HDD technology. 
(WHITE PAPER) READ ABSTRACT |

Using EHRs to Achieve Meaningful Use by SearchHealthIT.com

June 2013 - (Free Research)
As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery. 
(WHITE PAPER) READ ABSTRACT |

31% of storage pros choose Dell for flash/SSDs* by Dell India

February 2014 - (Free Research)
View this 1-page resource to see why 31% of storage pros choose this top vendor for flash/SSD deployment. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

PostgreSQL vs MySQL by EnterpriseDB Corporation

August 2009 - (Free Research)
DBAs, developers, and IT managers and decision-makers will benefit from this hour-long presentation about the pros and cons of using PostgreSQL or MySQL, which will include a discussion about the ongoing trend towards using open source in the enterprise. 
(PODCAST) READ ABSTRACT |

Deploying Operating System Images on Dell Business Client Systems using Microsoft® Deployment Toolkit (MDT) 2008 by Dell, Inc. and Intel®

June 2009 - (Free Research)
The Microsoft® Deployment Toolkit (MDT) 2008 provides unified processes and tools for desktop and server OS deployment using a common deployment console and a collection of best practices. The toolkit provides a single mechanism for image creation and an automated installation process to reduce deployment time. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts