X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 unix administrator


RISC-y Business: Building the Case for Next-generation UNIX Systems
With Intel, Oracle, and IBM recently announcing next-generation UNIX architectures, Charles King of Pund-IT, Inc. analyzed the announcements. As this report

unix administrator  the Case for Next-generation UNIX Systems With Intel, Oracle, and IBM recently announcing next-generation UNIX architectures, Charles King of Pund-IT, Inc. analyzed the announcements. As this report explains, all three vendors have faced competition from “below” in x86 servers and have responded in similar ways—improving reliability, availability, and scalability features, improving performance, and introducing workload optimization. Find out more.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » unix administrator

Sendmail Takes Security to the Next Level with Version 3.0 for NT


Sendmail 3.0 includes the Sendmail Message Transfer Agent, a Mailing List Server, a POP3 Server and a Message Store.

unix administrator   Read More

Trend Virus Control System - A Centralized Approach to Protection


Trend Virus Control System (TVCS) utilizes a web based management console, which allows for administration, configuration and policy enforcement from a central location.

unix administrator   Read More

The AS/400 Takes You Securely Where You Want to Go


This article on the built-in security features of the AS/400 system originally appeared in the Midrange Computing’s Showcase Magazine, June 2000.

unix administrator   Read More

6 Days After Advisory Posted, AboveNet Gets Hit


Once a security advisory gets posted, vendors need to work quickly to rectify the problem. Security engineers are not the only ones reading the advisories. There are cybercriminals who wait for advisories to come out, and take advantage of woe-be-gone networks that have not yet been patched.

unix administrator   Read More

ABAS-USA Inc.


Since 1980, abas-USA has provided cost-effective enterprise resource planning (ERP) solutions to small to midsize firms.  ABAS serves make-to-order (MTO), engineer-to-order (ETO), and assemble-to-order (ATO) manufacturers and distributors in the following industries: automotive, electronic, fabrication and assembly, machinery, instrumentation, pump, valves, vacuum, aerospace, and other high-tech industries. ABAS supports lean manufacturing practices, Kanban, and just-in-time (JIT) environments. Operating on LINUX, Unix, or Windows, abas ERP has flexibility, scalability, and ease of use.

unix administrator   Read More

Should interBiz Mean Intelligence And Prediction Beyond ERP?


Although interBiz has spouted an interesting value proposition to many enterprise applications users, the company still has to address some potential stumbling blocks in order to clear the path to its applications business success.

unix administrator   Read More

How to Reclaim Your E-mail Using Whitelists


This guide explores what a whitelist is, the distinction between sender source whitelists and sender address whitelists, the characteristics of a good whitelist, the role of the user in managing a whitelist, and finally the role of the IT administrator in the whitelist management process.

unix administrator   Read More

Great Product: Too Bad The Architecture Doesn’t Fit


During the process of product selection a great deal of attention is given to the functional capabilities of the software being evaluated. While this aspect is obviously important, ignoring the technical mechanisms by which the software actually operates can be fatal to a project. In this document we explain how to avoid the pitfalls.

unix administrator   Read More

IBM Continues RS/6000 Performance Focus


IBM has just released benchmark results for its mid-range Unix server, the RS/6000 M80, showing it to be a top performer in transaction processing and Web serving.

unix administrator   Read More

Red Hat Plays 'Love You, Love You Not' with CPUs


Red Hat has announced the release of Alpha Deluxe, its version of Linux for computers based on Compaq’s Alpha CPU. At the same time, the company announced it would drop support for Sun’s Sparc processor.

unix administrator   Read More