ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.
WHITE PAPER:
In this case study, you’ll discover how Red Hat helped one telecommunication provider deliver a scalable, cost-effective cloud platform for e-learning in schools in Malaysia.
CASE STUDY:
Explore this exclusive case study to find out how a Germany-based business partner of IBM utilizes these technologies to create an efficient data center, and fuel business productivity.
WHITE PAPER:
This white paper examines various high availability scenarios for running SAP on SUSE Linux. Determine which one is right for your enterprise and obtain detailed advice for properly enabling it.
WHITE PAPER:
This expert paper explains how migrating from UNIX-based systems to Linux standard-based servers can simplify the virtualization of your critical applications, enabling improved performance, reliability and agility.
WHITE PAPER:
This document describes the recommended uses of the system application programming (API) and binary interfaces (ABI) that are intended to provide compatibility across Red Hat Enterprise Linux releases.
WHITE PAPER:
This course teaches system administrators and those responsible for managing a cloud how to implement a cloud computing environment using Red Hat® Enterprise Linux® OpenStack® Platform, including installation, configuration, and maintenance.
CASE STUDY:
This case study reveals how Credit Union System for Brazil (Sicoob), the largest credit union system in Brazil, replaced their existing IT infrastructure with a virtualized Linux landscape, allowing them to avoid USD 1.5 million in annual costs.
WHITE PAPER:
Because SAP systems are critical to business operations, companies must ensure that they remain consistently available. This white paper explains how you can leverage virtualization to consolidate SAP servers without compromising the reliability of these crucial applications.
EGUIDE:
Learn the importance of securing Docker containers, how they can threaten the security of your enterprise, and how to mitigate the vulnerabilities presented by the technology.