Drivers White Papers

(View All Report Types)
Implementing Device Restrictions in Vista and Server 2008
sponsored by Global Knowledge
WHITE PAPER: With Vista clients and Server 2008 systems, we have a number of new Group Policy settings that allow us to exert some level of control over which devices users can install and use.
Posted: 23 Jan 2009 | Published: 23 Jan 2009

Global Knowledge

Mobilizing Enterprise Applications (MEAP)
sponsored by AT&T Corp
WHITE PAPER: Developers are spending too much time adapting mobile applications for specific devices, and not enough time developing apps that could deliver more business value. This paper explains how a Mobile Enterprise Application Platform (MEAP) can provide a sound, sustainable strategy for mobilizing enterprise applications.
Posted: 13 Oct 2010 | Published: 13 Oct 2010

AT&T Corp

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Vendor Landscape: Virtual Backup Software
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to evaluate virtual backup software to end the arguing between virtual and backup admins. Read on to consider a solution to back up your virtual infrastructure, understand what's new in the virtual backup market, and determine which products are most appropriate for particular use-cases and scenarios.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Dell Software

Disaster Preparedness: Is there a hole in your disaster recovery plan?
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to learn how software escrow agreements can be a critical tool to help ensure application continuity within your business continuity plan.
Posted: 04 Jan 2012 | Published: 04 Jan 2012

Iron Mountain

Magic Quadrant for Mobile Device Management Software
sponsored by IBM
WHITE PAPER: This Magic Quadrant for mobile device management software explores the top vendors' MDM offerings. Discover the strengths and cautions associated with each MDM vendor to see which one is right for you, or if your current vendor is living up to its competition.
Posted: 13 Aug 2013 | Published: 31 Dec 2012

IBM

IBM FlashSystem 900: Value at the Core
sponsored by IBM
WHITE PAPER: Access this white paper to learn how flash storage can boost storage performance and speed up processing times. Read on to learn about the technology behind a new flash storage system.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

IBM

The Application Migration Workbook
sponsored by Citrix Systems, Inc.
WHITE PAPER: Discover how to achieve pain-free application migrations in this essential workbook and guide. Read on to uncover key strategies and technologies that can simplify the process and lay the foundation for more effective application management.
Posted: 17 Jul 2012 | Published: 17 Jul 2012

Citrix Systems, Inc.

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork