Voice Biometrics White Papers

(View All Report Types)
HP white paper: Complete Data Protection for VMware Virtual Environments
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper examines the issues of backup and recovery in VMware virtual server environments, and outlines the key features of HP Data Protector.
Posted: 26 Jun 2009 | Published: 01 Nov 2008

Hewlett Packard Enterprise

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl
sponsored by Oracle Corporation
WHITE PAPER: This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl.
Posted: 03 Apr 2009 | Published: 01 Mar 2009

Oracle Corporation

Painting the CPG Supply Chain GREEN
sponsored by Wipro
WHITE PAPER: This paper offers a solution for businesses to achieve balance between profitability and sustainability by leveraging the platform of packaged implementations.
Posted: 27 Jul 2009 | Published: 02 Apr 2009

Wipro

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group