Removing Internet Anonymity Barriers with IP Intelligence
sponsored by Digital Element
WHITE PAPER:
NetAcuity IP Intelligence technology provides an excellent way to non-invasively gather new intelligence about the online universe, and Digital Element delivers the de facto standard in IP Intelligence.
Posted: 31 Jan 2008 | Published: 01 Jan 2007
|
|
|
Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER:
This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010
|
|
|
Requirements Definition as the Foundation for Effective Software Delivery
sponsored by IBM
WHITE PAPER:
This white paper examines the challenges that impede teams as they try to collect, analyze, and evaluate ideas to define the best solution requirements. The paper also provides information on the four critical areas to defining great requirements and how IBM Rational® solutions help teams address these areas.
Posted: 16 Mar 2009 | Published: 13 Mar 2009
|
|
|
A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?
sponsored by IBM
WHITE PAPER:
This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.
Posted: 14 May 2008 | Published: 01 May 2008
|
|
|
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER:
When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER:
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008
|
|
|
Whitepaper: How to Segregate & Load Balance 10G Traffic to 1G Tools
sponsored by Gigamon
WHITE PAPER:
Check out this brief paper to learn how using a Data Access Switch with multi-rule mapping feature to share the load among multiple parallel processing Gigabit tools, 10-Gig network can be monitored comprehensively and cost-effectively.
Posted: 06 Jul 2009 | Published: 06 Jul 2009
|
|
|
Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER:
Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008
|
|
|
GPS Receiver Testing
sponsored by National Instruments
WHITE PAPER:
Today, the power of software enables you to create GPS waveforms that accurately emulate the real word signal. In addition, advances in instrument bus technology enable record and playback of live GPS signals with PXI instrumentation.
Posted: 21 Jul 2008 | Published: 01 Jan 2006
|
|