Xenix White Papers

(View All Report Types)
ISVs, "This One's for You"
sponsored by AppZero
WHITE PAPER: Virtual machines and virtual appliances have successfully transformed data center operations. AppZero Virtual Application Appliances extend that transformation to server applications- Linux, Unix, and Windows. This paper explains Instant POCs, simplified implementations, and a cloud friendly slide to the SaaS model.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

AppZero

The Value of Power VM Workload Partitions: New Virtualization Options in IBM AIX v6.1
sponsored by IBM
WHITE PAPER: This paper examines the flexibility that WPARs offer IT professionals in their virtualized UNIX server environments and review how WPARs are different from other partitioning technologies.
Posted: 18 Jul 2008 | Published: 01 Feb 2008

IBM

HRG Assessment - Linux Migration
sponsored by Red Hat & IBM
WHITE PAPER: The migration from proprietary UNIX and legacy hardware and software-based environments to Linux on x86 Intel architecture (IA) is an effective way to take cost and complexity out of IT.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

What Oracle Solaris Brings to Oracle Exalogic Elastic Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents a system, designed to revolutionize data center consolidation, enabling enterprises to bring together disparate, mission-critical workloads with maximum reliability and security. Learn how this system, consisting of software, firmware and hardware, can reduce application implementation costs and more.
Posted: 29 Jun 2012 | Published: 31 Dec 2011

Oracle Corporation

The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER: Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009

Red Hat and Intel

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more.
Posted: 21 May 2010 | Published: 20 May 2010

BeyondTrust Corporation

Migrating From UNIX/ RISC To Red Hat Enterprise Linux® On Intel® Processor-Based Servers
sponsored by Red Hat and Intel
WHITE PAPER: Red Hat Enterprise Linux running on Intel® processor-based servers is helping companies cut TCO by up to 50 percent and more versus comparable UNIX/RISC solutions, while providing a better foundation for growth. This white paper outlines the key benefits of migration and provides a step-by-step guide to conducting a successful transition.
Posted: 10 Aug 2009 | Published: 10 Aug 2009

Red Hat and Intel

Linux Made Easy: Migrating From Unix
sponsored by Red Hat & IBM
WHITE PAPER: Organizations are considering migrating to Linux to receive dramatic cost reductions, as well as increased stability, security, uptime, and availability. Red Hat® Network Satellite helps to make the migration from a proprietary UNIX environment—and acceptance of Linux...
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Red Hat & IBM

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM