Operating systems

Whether its UNIX, Linux, OS, or Windows you favor, TechRepublic has everything you need to know to keep things running smoothly.

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Nov 2014

    Select The Right Solution For Identity And Access Assurance 

    This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and...

    Sponsored By IBM

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Dec 2014

    Open Source is Driving Innovation

    Competition is rapidly growing. Margins are getting slimmer. And the need for business efficiency is at a critical level. In today’s wold, companies are turning to open source technologies to make better and smarter business decisions, faster than ever before. See how IBM Linux Server solutions can help your company...

    Sponsored By IBM

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Sponsored By ObserveIT

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • White Papers // Jul 2014

    Transforming Testing Through Automation

    "Test your code as you write it." That’s a common mantra heard in many development teams today. However, for too many, that practice remains a lofty goal as opposed to a business reality. They lack the appropriate metrics and processes to make and measure progress and often underestimate the effort...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Development Testing for Java

    Learn how the Coverity Development Testing Platform can be used in conjunction with open source solutions to help you fix more of the quality and security issues in your Java code that matter, with your existing resources and a unified process across the enterprise.

    Sponsored By Coverity

  • White Papers // Nov 2014

    Migrating Your Data Center to an Application Centric Infrastructure

    Organizations everywhere recognize that changing application environments are creating new demands for the IT infrastructure, causing a transformation within the data center. There is a need to address key business and technological transitions in terms of application delivery and consumption. As such, data center managers are assessing what new capabilities...

    Sponsored By Cisco

  • White Papers // Oct 2014

    Firewall Buyers Guide 2014

    Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: • The fundamentals of modern firewall technology • The ten critical business requirements your next firewall needs to address • Information on how to create a vendor request for proposal...

    Sponsored By Palo Alto Networks

  • eBooks // Oct 2013

    Top Ten Considerations for Selecting the Right RMM Solution

    Remote monitoring and management (RMM) is an important part of your IT services offering. RMM tools enable service delivery and provide a number of benefits, including increased customer service levels, time and money savings, and ultimately a more effective and profitable business. Read this eBook for tips to ensure you...

    Sponsored By LabTech Software

  • White Papers // Nov 2014

    Infographic - Do you Believe the Myths Around Virtualization?

    There are a lot of myths floating around about virtualization. It will cause downtime. It requires specialized skills and expertise. It is simply too expensive. So, do you believe these myths? Check out this informative infographic for some myth-busting facts about how virtualization actually: Drives down costs Increases...

    Sponsored By VMware

  • White Papers // Aug 2014

    The Top Virtualization Myths Debunked

    The following information brief explores some of the most commonly expressed concerns about virtualization – to help you distinguish fact from fiction. Read more..

    Sponsored By VMware

  • White Papers // Jul 2014

    Whitepaper: Exclusive Aberdeen Group Analyst Report

    Are your finance and HR system silos helping or hurting your organization? Read this whitepaper from analyst firm Aberdeen Group to learn about the future of strategic business management, including key drivers for unification such as reporting processes and employee management.

    Sponsored By Workday

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Jan 2014

    Data Security in the Cloud

    Maintaining control over the data is paramount to cloud success. In this CSO Magazine whitepaper, learn about Cloud Computing Security Challenges, Techniques for Protecting Data in the Cloud and Strategies for Secure Transition to the Cloud.

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Sharing Mac Files on Windows Servers - A Technical Best Practices White Paper

    This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing the Acronis’ ExtremeZ-IP® solution for the first time.

    Sponsored By Acronis

  • White Papers // Aug 2014

    Migration Away From Windows XP: the Imperative for Change

    As many of you already know, support for Windows XP is coming to an end – but what does this really mean for your organization? Read this exclusive white paper to prepare for the end of Windows XP support.

    Sponsored By VMware

  • White Papers // May 2014

    Why Data Domain: Slow backups got you down?

    Traditional backups are just too slow, inefficient and unreliable for the typical data centre of today. If it’s bad now, it’s only going to get worse with more severs and more data to protect. Someone once said, the definition of insanity is continuing to do the same thing over and...

    Sponsored By EMC

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    In this paper, Hurwitz & Associates interviewed customers in a variety of industries to assess how they are approaching security for their cloud deployments leveraging IBM’s Security Intelligence Platform and suggests approaches to implementing cloud security.

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2015

    IAM Buyers Guide: Select the Right Solution for Identity and Access Assurance

    This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and...

    Sponsored By IBM

  • White Papers // Jun 2014

    TechViews Podcast: The Security Reality in 2014

    IT security is a brave new world for enterprise companies. As threats increase in frequency and variation, IT security teams must also allow more access to corporate assets and data than ever before. New trends like BYOID challenge traditional security measures, but enable ease of use for consumers. Striking a...

    Sponsored By CA Technologies

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to...

    Provided By Druva Software

  • Downloads // Apr 2011

    Create a USB Flash Drive Windows Password Reset Disk

    In this edition of the Windows Desktop Report, Greg Shultz shows you how to create and use a Password Reset Disk in Windows 7 using a USB Flash Drive rather than a CD or floppy disk.

    Provided By Greg Shultz

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Provided By Dell Software

  • Downloads // Apr 2012

    Cheat sheet: 100 Windows keyboard shortcuts

    Navigating Microsoft Windows 8 is going to require a bit of re-training. Why not get a head start with a cheat sheet of 100 keyboard shortcuts.

    Provided By Greg Shultz

  • White Papers // May 2014

    7 Elements of Radically Simple OS Migration

    Avoid the typical headaches of OS migration during your next project by learning about 7 elements that will enable you to: Centrally manage data migration Preserve users’ data and personal settings Mitigate network impacts during migration Access the white paper to find out how to radically simplify your...

    Provided By Druva

  • Downloads // Apr 2010

    10 Linux rescue tools for recovering Linux, Windows, or Mac machines

    When you're dealing with a system that won't boot, you need a robust and dependable recovery tool. Here are a few Linux tools that might save the day.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // May 2009

    Create your own yum repository

    Vincent Danen explains how to create your own yum repository with the createrepo tool. One thing it allows you to do is to distribute specialized packages within an organization.

    Provided By Vincent Danen

  • White Papers // Jun 2007

    An Open Source Java Framework for Biometric Web Authentication Based on BioAPI

    One of the major early problems that biometrics faced was the lack of interoperability between different software applications and devices developed by different vendors. The BioAPI Specification has defined an open system standard Application Program Interface (API) which allows software applications to communicate with a broad range of biometric technologies....

    Provided By Universidad de Vigo

  • Downloads // Oct 2009

    100 keyboard shortcuts for moving faster in Windows 7

    You don't have to experiment to find out which traditional shortcuts still work in Windows 7 -- or search for ones that have been added to the new OS. Just refer to this quick reference to speed common Windows 7 tasks.

    Provided By Greg Shultz

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Provided By Dell Software

  • White Papers // Mar 2010

    Essential Guide to an NDS-to-Active Directory Migration

    With the release of Windows Server 2008 and the latest iteration of Active Directory, many enterprise IT departments have decided that Active Directory is a sufficiently mature and proven technology and that the time has come to move from their current networking environment. Included in this group is a fairly...

    Provided By Dell Software

  • Downloads // Sep 2005

    50+ keyboard shortcuts for moving faster in Windows XP

    These 50+ keyboard shortcuts can help you navigate Windows XP faster than ever. The point and click interface has made computers accessible to the masses, but IT pros know it's much faster to use keyboard shortcuts than to point and click. These 50-plus shortcuts will help you navigate Windows...

    Provided By TechRepublic

  • Downloads // Jan 2006

    10 things you can do when Windows XP won't boot

    If your computer powers up okay, but the Windows XP operating system won't boot properly, you have some troubleshooting ahead of you. Here's a look at the likely culprits and what you can do to fix the problem. When you're dealing with a Windows XP system that won't boot,...

    Provided By TechRepublic

  • Downloads // Jul 2003

    Fsutil Query Tool

    With a total of 58 different operations, Windows XP's Fsutil utility can be difficult to use, but our Fsutil Query Tool cuts through the confusion and brings the probative capabilities of Fsutil to the Windows user interface.

    Provided By TechRepublic

  • Downloads // Aug 2008

    10 quick tips to make Linux networking easier

    Linux makes networking simple and secure -- if you know a few tricks. Jack Wallen shares some pointers to help admins knock out various Linux networking tasks with a minimum of effort.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // Aug 2008

    10 fundamental differences between Linux and Windows

    Before debating the relative merits and shortcomings of Linux and Windows, it helps to understand the real distinctions between them. Jack Wallen has distilled the key differences into one list.This download is also available as an entry in our 10 Things blog.

    Provided By Jack Wallen

  • Downloads // Feb 2009

    10 iptables rules to help secure your Linux box

    Mastering iptables could take a while, but if you have a few rules to cover the basic security needs, you'll be well on your way to protecting your Linux system. Jack Wallen explains some key rules to get you started. This download is also available as an entry...

    Provided By Jack Wallen