Tokens White Papers

(View All Report Types)
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Can Your Data Center Infrastructure Handle the Heat of High Density
sponsored by CyrusOne
WHITE PAPER: High density computing is today's standard in best-in-class performance and availability, and those that fail to keep pace or fall behind will find themselves no longer competitive in today's markets.
Posted: 11 Aug 2008 | Published: 01 Aug 2008

CyrusOne

The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
sponsored by Coupa
WHITE PAPER: While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Coupa

Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER: In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

Dell PowerVault MD3000 1000 Mailbox Local Continuous Replication Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Increasing Business Performance: Using Virtualization for SAP Applications on IBM System p Servers
sponsored by IBM
WHITE PAPER: This white paper captures the experiences of six large companies running SAP applications using IBM® System p™ virtualization.
Posted: 17 Jun 2008 | Published: 16 Jun 2010

IBM

Virtualization in Education
sponsored by IBM Line of Business
WHITE PAPER: This white paper discusses how virtualization technology can help connect educators and students to applications and information from almost any device.
Posted: 12 Jun 2008 | Published: 01 Oct 2007

IBM Line of Business

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Virtualizing the Client PC: A Proof of Concept
sponsored by Intel Corporation
WHITE PAPER: In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Intel Corporation