Handheld Software White Papers

(View All Report Types)
Five Technologies Simplifying Infrastructure Management
sponsored by Liebert Corporation
WHITE PAPER: This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
Posted: 20 Feb 2008 | Published: 01 Jan 2007

Liebert Corporation

Best Practices for Windows Vista Planning, Migration, and Ongoing Management
sponsored by Symantec Corporation
WHITE PAPER: It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.
Posted: 02 Jul 2007 | Published: 01 Jun 2007

Symantec Corporation

Red Hat Enterprise Linux 5 General Overview
sponsored by Red Hat and JBoss
WHITE PAPER: Red Hat Enterprise Linux 5 was released in early 2007. Learn about its enhanced level of capabilities and new levels of performance, scalability and security.
Posted: 18 Sep 2007 | Published: 01 Feb 2007

Red Hat and JBoss

Dell™ PowerVault™ MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Disaster Recovery Planning for BlackBerry Enterprise Server for Microsoft Exchange
sponsored by BlackBerry
WHITE PAPER: This document provides an overview of BlackBerry® Enterprise Server components and is intended to help administrators prepare for the design and delivery of disaster recovery procedures for the BlackBerry environment.
Posted: 22 Jun 2009 | Published: 18 Mar 2009

BlackBerry

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

The Match Game: Is Offshoring a Fit for Your Help Desk Outsourcing Strategy?
sponsored by ABS Associates, Inc.
WHITE PAPER: Let's examine the pros and cons of each as well as different situations where one or the other is the ideal match for your service desk strategy.
Posted: 13 Feb 2008 | Published: 13 Feb 2008

ABS Associates, Inc.

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Leverage ERP for Sales & Operations Planning
sponsored by IFS
WHITE PAPER: Read this white paper to learn how to use your ERP to facilitate Sales and Operations Planning (S&OP), which helps manufacturers rapidly adjust to changes in the market.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

Canvas Systems