Operating systems

Whether its UNIX, Linux, OS, or Windows you favor, TechRepublic has everything you need to know to keep things running smoothly.

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    The Top 10 Steps to Ensure a Successful Migration to Exchange 2013

    This report takes a detailed look into the best way to better manage the migration to Exchange and how Dell’s migration solution can help you mitigate the risk and eliminate the impact on your end users.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Desktop Workspace: Extending Support for Windows XP-Based Apps

    Discover how to quickly implement secure desktop containers running Windows XP on a Windows 7 or 8 PC, or even on a Mac®. You can centrally manage and tightly lock down your XP environment, and still execute locally to maintain access to those applications for as long as necessary.

    Sponsored By Dell Software

  • White Papers // May 2014

    Mitigating Targeted Attacks Requires an Integrated Solution

    Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a...

    Sponsored By Trend Micro

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Sponsored By Druva

  • White Papers // May 2014

    XP Migration Made Easy with Druva inSync

    With a 50% chance of putting in overtime for XP migration, migrating all your devices can seem like an insurmountable task. Utilizing inSync can simplify data migration for thousands of devices and reduce the amount of time and resources you need to put into migration.

    Sponsored By Druva Software

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Sponsored By Druva Software

  • White Papers // May 2014

    Nightmare on Delegation Street with Native AD Tools

    Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you’re using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever.

    Sponsored By Dell Software

  • White Papers // May 2014

    HP ServeIT

    Focus on running your business, not your business IT. HP ServeIT combines the world’s most intelligent servers with associated software options, and services, to solve today's challenges while preparing you for future business growth. Whether you are just starting out in defining your IT requirements, are ramping up your IT...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Apr 2014

    Windows® XP Migration: Protect and Secure Critical Data

    With the end of the Microsoft Windows XP operating system’s lifecycle on April 8, 2014, businesses are faced with the decision to migrate to a newer operating system or to continue with XP without continuing security updates. This solution brief discusses how CommVault Simpana software can help business protect and...

    Sponsored By CommVault Systems

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    5 eDiscovery Challenges Solved

    eDiscovery challenges continue to present themselves as data storage becomes more complex and grows the Big Data Era. Read this CommVault Solution Brief to learn how to deal with 5 persistent eDiscovery challenges with Simpana 10 software.

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Supply chain planning and optimization solutions for the container shipping industry

    This briefing offers supply chain planning and optimization solutions for the container shipping industry. Readers can learn how intelligent planning and optimization can be used to improve predictability and on-time delivery.

    Sponsored By Quintiq

  • White Papers // Apr 2014

    Fully integrated container terminal planning and optimization

    This whitepaper provides information for businesses in the ports and terminals industry. Quintiq’s solution is fully integrated container terminal planning and optimization and can handle complex operations and extreme challenges.

    Sponsored By Quintiq

  • White Papers // Mar 2014

    Review of HP Agile Manager by Planit

    When searching for an appropriate tool for Agile project work, look no further than HP Agile Manager. Agile Manager helps with projects that demand more technical testing and competency and coding and architecture that require a degree of understanding and significant automation capability. HP Agile Manager enables testers to view...

    Sponsored By Planit

  • White Papers // Feb 2014

    Real-world Identity and Access Management (IAM) for Unix-based Systems

    Short/long: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    What to Look for When Evaluating Next-Generation Firewalls

    This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. See why not all next-generation firewalls offer the same level of protection – get your copy now.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How traditional firewalls fail

    Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren’t effective in today’s world. This e-book explains where traditional firewalls fall short – and what you can do about it.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How to Build a Massively Scalable Next-Generation Firewall

    Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Virtual Desktops in the Cloud: Changing the Face of Desktop Security

    Desktops, virtualization and security: To many, these three terms may seem mutually exclusive as they are by historical perspective and traditional consideration, in opposition to one another. Desktops offer individuality, personalization and are based on distributed users. Virtualization is associated with flexibility, mobility and cost effectiveness. Security is perceived as...

    Sponsored By Desktone

  • Podcasts // Jan 2014

    Unum Group DevOps Podcast

    Listen to the podcast on how employee benefits provider Unum Group has been building a DevOps continuum, and is further exploring the benefits of a better process around cloud-assisted applications development and deployment. Featured on the podcast are Tim Durgan, an Enterprise Application Architect at Unum Group, and Petri Maanonen,...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Jan 2014

    OpenText Fax2Mail vs. Fax Machines

    An overview of a fax service that eliminates fax machines, enhances employee productivity and drives profitability.

    Sponsored By OpenText

  • Resource Center // Nov 2013

    IBM System and Software Engineering Solution trial sandbox

    The Rational solution for systems and software engineering is an integrated solution that helps teams specify, design, implement, and validate complex products and the software that powers them. The solution offers an integrated set of capabilities that enables you to predictably deliver competitive, high-quality products while meeting regulatory and compliance...

    Sponsored By IBM

  • White Papers // Oct 2013

    Top Ten Characteristics for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • White Papers // Aug 2013

    Controlling Laptop and Smartphone Access to Corporate Networks

    Organizations today are grappling with the double-edged sword that is mobility. Smartphones, tablets and laptops are not only conduits of greater access and information flow, but can also serve as a vehicle for malware and other security threats. Companies that rely strictly on Remote Desktop Protocol (RDP) solutions are more...

    Sponsored By Dell Software

  • White Papers // Feb 2013

    Beyond the Next Generation - Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Oct 2012

    SAP and Sybase: A Marriage Made in Database Heaven (IDC)

    Examine information about SAP and Sybase, a year after their merger, provided at analyst briefings in May, 2011. These briefings were held at the SAPPHIRE NOW conference in Orlando, FL, and the Sybase Analyst Summit in New York.

    Sponsored By SAP

  • eBooks // Jun 2014

    Beyond Next-Generation Firewalls

    Cyberattacks are increasing every year, in both number and variety. But whether the malicious goal is money, espionage or disruption, you can protect your network and your business by applying the right security technology. Malicious actors have been innovating at a ferocious pace, and three- or four-year-old firewalls simply...

    Provided By Dell Software

  • White Papers // May 2014

    HP Takes World Record in Virtualization Performance for 4 Processors, 2 Nodes

    The new HP ProLiant DL560 Gen8 offers the ideal 4-processor dense form factor without compromising on performance as proved by the VMmark 2.1.1 world record benchmark result of 18.27 @18 tiles. Utilizing fewer disks drives than competitors, the ProLiant DL560 Gen8 offers customers enormous savings on power and rack real...

    Provided By HP and Intel®

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Active Directory

    Learn how using a combination of best practices and the right migration tools outlined in this white paper can help smooth the process of your organization migrating to Microsoft® Active Directory (AD).

    Provided By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Exchange

    Whether you are transitioning from a legacy platform, consolidating multiple Exchange environments or upgrading to a more recent version of Exchange, learn how the tools and processes outlined in this webcast can help streamline your migration project.

    Provided By Dell Software

  • White Papers // Apr 2014

    How To Get the Best Results For Your Projects

    In too many organizations today, innovation isn’t happening fast enough. Within these businesses, skills are siloed and resources are misaligned. As businesses seek to speed innovation and meet their growth and revenue targets, they have to get maximum utility out of all their investments. That’s why, when making a change...

    Provided By CA Technologies

  • White Papers // Mar 2014

    Getting the Most out of Your Windows Upgrade

    How will the end of Microsoft® XP support impact your organization? While a timely OS migration eases immediate IT concerns, it may have the added benefit of helping to drive larger business goals. Learn from an expert ways to achieve greater automation and reduce licensing costs while increasing manageability and...

    Provided By Dell & Microsoft

  • White Papers // Mar 2014

    Ultimate Tech Challenge

    Operating system migrations can present a handful of situational complexities. We asked industry professionals to tell us about their real-world solutions for challenges they’ve faced during Windows OS migrations. In this interview, one IT leader candidly shares his experience. His lessons learned can help others ensure a smooth Windows migration....

    Provided By Dell & Microsoft

  • White Papers // Mar 2014

    Porting Applications to Linux on IBM System Z

    This white paper examines some of the common misconceptions about porting applications to Linux on IBM System z mainframes. It also provides an overview of the process used by the Platform Technology Center to port applications to Linux on IBM System z hardware. This paper will also discuss the decision...

    Provided By IBM

  • Case Studies // Mar 2014

    HP: Risky business: why business leaders must take action on Windows XP?

    This ZDNet and TechRepublic guide, in association with HP, looks at what's at stake for those who're still on XP, explains some of the threats, and offers options to help the risk-exposed take action to protect their business.

    Provided By HP US