AIX White Papers

(View All Report Types)
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
sponsored by Dell Software
WHITE PAPER: This white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Choosing the Right Active Directory Bridge Solution - Quest Authentication Services
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn about key questions to ask when evaluation Active Directory bridge solutions and discover benefits to your IT environment including; more efficiency, higher security and better compliance.
Posted: 24 May 2011 | Published: 23 May 2011

Dell Software

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Value Proposition for IBM Power Systems: Comparing Costs of IBM PowerVM and x86 VMware for Enterprise Server Virtualization
sponsored by IBM
WHITE PAPER: This white paper examines the advantages of an integrated, UNIX-based server virtualization platform. Compare the TCO and workload capabilities of this architecture with its popular x86 counterparts to determine a best-suited virtualization approach for your organization.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

IBM

ISVs, "This One's for You"
sponsored by AppZero
WHITE PAPER: Virtual machines and virtual appliances have successfully transformed data center operations. AppZero Virtual Application Appliances extend that transformation to server applications- Linux, Unix, and Windows. This paper explains Instant POCs, simplified implementations, and a cloud friendly slide to the SaaS model.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

AppZero

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

RedBook: Oracle to DB2 Conversion Guide - Compatibility Made Easy
sponsored by IBM
WHITE PAPER: New IBM DB2 features make compatibility easy. In this guide, you’ll learn about native support for PL/SQL, new data types, scalar functions, improved concurrency, built-in packages, OCI, SQL*Plus, data movement tools, best practices and more—all designed to improve your ability to run applications on both DB2 and Oracle platforms
Posted: 01 Sep 2010 | Published: 01 Sep 2010

IBM

IBM Sets Pace in Unix Virtualization
sponsored by IBM
WHITE PAPER: This Gabriel Consulting report research report focuses on the survey results and discusses IBM’s Power Systems virtualization milestones and touches on the implications for the Unix server market.
Posted: 15 Jun 2010 | Published: 16 Jun 2010

IBM

Red Hat Provides CEPSA with a Scalable, Standardized, High-Availability SAP Platform
sponsored by Red Hat - HPE
WHITE PAPER: Access this exclusive study to learn how an energy company improved SAP platform response time, reduced infrastructure costs and built a standardized, scalable platform with high availability by switching to standard servers running on in a Linux environment.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation