Desktop Publishing Software Reports

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016

TechTarget ComputerWeekly.com

The Ultimate Guide to Enterprise Content Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Enterprise Content Management (ECM) has rapidly evolved as different forms of content have been introduced to the work environment. In this guide, find out how ECM works, why it is so important, the key components and benefits, and what to look for when choosing ECM software.
Posted: 05 Oct 2022 | Published: 05 Oct 2022

TechTarget ComputerWeekly.com

Using IT initiatives to save money and reinforce green credentials
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.
Posted: 08 Feb 2021 | Published: 05 Jan 2017

TechTarget ComputerWeekly.com

Your guide to the open source universe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.
Posted: 08 Feb 2021 | Published: 29 Aug 2017

TechTarget ComputerWeekly.com

Ten Steps to Better Requirements Management
sponsored by IBM
WHITE PAPER: Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.
Posted: 02 Apr 2009 | Published: 01 Oct 2008

IBM

Testing Embedded Systems: Do You Have the GuTs for It?
sponsored by IBM Software Group
NEWSLETTER: This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed.
Posted: 14 Mar 2008 | Published: 24 Nov 2003

IBM Software Group

The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER: This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Dorado Software

The Match Game: Is Offshoring a Fit for Your Help Desk Outsourcing Strategy?
sponsored by ABS Associates, Inc.
WHITE PAPER: Let's examine the pros and cons of each as well as different situations where one or the other is the ideal match for your service desk strategy.
Posted: 13 Feb 2008 | Published: 13 Feb 2008

ABS Associates, Inc.

The Role of Integrated Requirements Management in Software Delivery
sponsored by IBM
WHITE PAPER: This paper is about the critical role that integrated requirements management can play in helping to ensure that your business goals and IT investment are continuously aligned.
Posted: 24 May 2010 | Published: 01 Oct 2007

IBM

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

The Supply Chains Innovator's Technology Footprint
sponsored by Infor
WHITE PAPER: Pressure is increasing to better manage supply chains to improve customer service, lower product costs and increase business process efficiency. Read this paper to learn about best practices for improving an organization's supply chain proces...
Posted: 10 Nov 2006 | Published: 01 May 2006

Infor

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

TMA Resources Increases Customer Satisfaction Rates by Four Times with Parature Customer Service™ Software
sponsored by Parature, Inc.
CASE STUDY: In this case study, TMA needed to streamline and automate its manual customer service process to reduce resolution times and improve satisfaction. Learn how Parature Customer Service software reduced time on manual administrative activities by 25%.
Posted: 28 Aug 2008 | Published: 28 Aug 2008

Parature, Inc.

Top 10 Reasons You Need EMC MozyEnterprise
sponsored by EMC Corporation
PRODUCT LITERATURE: This document provides the top 10 reasons to choose EMC MozyEnterprise.
Posted: 07 Mar 2008 | Published: 01 Feb 2008

EMC Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER: This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008

Oracle Corporation

University of Georgia Gets Lesson: NetVault™ Makes the Grade in Power, Ease of Use
sponsored by BakBone
CASE STUDY: UGA evaluated several companies backup/restore software, before choosing BakBone Software NetVault. This case study examines why UGA opted for BakBone software.
Posted: 16 Apr 2008 | Published: 01 Nov 2001

BakBone

User Interface Development for Embedded Systems
sponsored by Mentor Graphics
TECHNICAL ARTICLE: An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls.
Posted: 10 Mar 2009 | Published: 13 Jan 2009

Mentor Graphics

User's Guide to Office 2007 - No Need to Wait, Deploy It Now
sponsored by Global Knowledge
WHITE PAPER: It seems we're always dragged kicking and screaming into the newest operating system, programs, or hardware systems. Office 2007 is quite an initial adjustment yet it is one the most functional products from Microsoft in a while.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Global Knowledge

Vestcom International: Personalization Drives Repeat Business
sponsored by Exstream Software
CASE STUDY: Vestcom International is a New Jersey-based firm that offers end-to-end personalized communication solutions. Vestcom used Exstream Software's Dialogue solution to design a sophisticated relationship management program that is fostering...
Posted: 24 Apr 2008 | Published: 01 Jan 2004

Exstream Software

Virtual Data Center eZine - Vol.5
sponsored by Dell Compellent
EZINE: According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.
Posted: 24 Sep 2012 | Published: 31 Oct 2008

Dell Compellent

Virtual Data Center eZine - Volume 4
sponsored by Virtual Data Center eZine - Volume 4
WHITE PAPER: This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization.
Posted: 20 Aug 2008 | Published: 18 Aug 2008

All resources sponsored by Virtual Data Center eZine - Volume 4

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis