Linux in the Enterprise Reports

Infographic: 2019 Europe IT Priorities - Datacentre
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Analysis of the Linux Audit System
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
Posted: 08 Feb 2021 | Published: 01 Sep 2016

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Application Development and DevOps
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.
Posted: 08 Feb 2021 | Published: 04 Jul 2018

TechTarget ComputerWeekly.com

Red Hat and Intel: New Horizons in Scalable Performance, Reliability, Security, and Efficiency
sponsored by Red Hat and Intel
WHITE PAPER: This whitepaper talks more about how Red Hat Enterprise Linux combined with the power of Intel Xeon processors can help IT stay above workload management and set your business on the path towards a new computing environment.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Red Hat and Intel

Why Securing Your Docker Containers Should Be Top Priority
sponsored by NeuVector
EGUIDE: Learn the importance of securing Docker containers, how they can threaten the security of your enterprise, and how to mitigate the vulnerabilities presented by the technology.
Posted: 07 Dec 2016 | Published: 05 Dec 2016

TOPICS:  Linux | Security
NeuVector

What Can Linux Do For Your Web UI and Customer Service?
sponsored by Red Hat
CASE STUDY: In this IDC ROI analysis case study, you’ll discover how Flybe, Europe’s largest regional airline, manages to keep the infrastructure that front ends the company's business-critical Web presence running smoothly and consistently.
Posted: 27 Jun 2014 | Published: 30 May 2014

Red Hat

How to increase Developer Productivity with OpenShift Platform as a Service in an Open and Hybrid Cloud
sponsored by Red Hat
WEBCAST: In this webinar, we'll discuss the different ways to take advantages of PaaS, how to utilize enterprise-class public PaaS platforms and your options for building an on-premise private or hybrid PaaS environments to enhance developer productivity.
Posted: 30 Apr 2013 | Premiered: May 16, 2013

Red Hat

Case study: IT Informatik - Leveraging Linux on IBM Power
sponsored by IBM
CASE STUDY: This case study explores how one company utilizes a leading Linux server and how it is assisting in datacenter real estate. Learn about how the new system is creating operation efficiency and how multilayer deployments are being consolidated onto a single server.
Posted: 21 Oct 2014 | Published: 30 Apr 2013

IBM

IBM Watson at Work: The Rise of Cognitive Computing
sponsored by IBM.
WEBCAST: Access this eye-opening webcast to learn about a question-answering analytics system that functions as a self-service chat session for customers that would normally contact a call center. Discover how this tool can drastically improve customer experience, decrease issue resolution time, increase top-line revenue, and more
Posted: 22 May 2013 | Premiered: Jul 17, 2013

IBM.

Case Study: GHY International
sponsored by IBM
CASE STUDY: Read this case study to examine how a leading company leverages Linux-systems and virtualization to offer its variety of services to end users.
Posted: 23 Oct 2014 | Published: 30 Apr 2013

IBM