Spoken Language Understanding White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Painting the CPG Supply Chain GREEN
sponsored by Wipro
WHITE PAPER: This paper offers a solution for businesses to achieve balance between profitability and sustainability by leveraging the platform of packaged implementations.
Posted: 27 Jul 2009 | Published: 02 Apr 2009

Wipro

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Leveraging Information for Innovation and Competitive Advantage
sponsored by IBM
WHITE PAPER: This paper by Hurwitz & Associates provides an overview of what is required to create an environment that leverages information dynamically in your enterprise.
Posted: 23 Apr 2008 | Published: 01 Jan 2007

IBM

HP white paper: Complete Data Protection for VMware Virtual Environments
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper examines the issues of backup and recovery in VMware virtual server environments, and outlines the key features of HP Data Protector.
Posted: 26 Jun 2009 | Published: 01 Nov 2008

Hewlett Packard Enterprise

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

The Performance Manager: Turning Information Into Higher Business Performance
sponsored by IBM
WHITE PAPER: Download this white paper for an extensive summary of The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, a book that examines the partnership between decision-makers and the people who provide them with information to drive better decisions.
Posted: 20 Jul 2009 | Published: 14 Feb 2008

IBM