Standards  >   File Formats  >  

Image Formats

RSS Feed    Add to Google    Add to My Yahoo!
Image Formats White Papers (View All Report Types)
 
Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

Optimizing Digital Image Storage: An Online Storage Optimization Brief
sponsored by Ocarina Networks
WHITE PAPER: This solution brief describes the Ocarina Solution, how it fits in to existing storage infrastructures, and provides an overview in to how Ocarina is able to optimize images for storage without giving up any image quality.
Posted: 20 Jun 2008 | Published: 20 Jun 2008

Ocarina Networks

Image-Based Data Protection: Simply Better Data Protection
sponsored by Dell Software
WHITE PAPER: In this Quest Software white paper, see why image-based data protection is the next step in protecting your company’s critical data. Learn about the true value of moving to a image-based data protection virtual solution, including a solid return on investment, and how this new technology works in your current backup environment.
Posted: 17 Jan 2011 | Published: 17 Jan 2011

Dell Software

The Need for Automotive Cybersecurity Testing Standards
sponsored by Synopsys
WHITE PAPER: Most organizations creating connected systems and devices today spend a considerable amount of time looking at security issues, but often lack a standard framework for testing security. Uncover the importance of developing standards for validating and verifying security.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Synopsys

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

Deploying Work Folders in a Virtual Storage Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about software that enables you to work on your files both on and offline, with an auto-sync feature to connect your files to the centralized server once it connects to the internet.
Posted: 21 Apr 2017 | Published: 31 Mar 2016

TechData - HPE

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Wireless LANs Standards: Where Are We Now?
sponsored by Burton Group
WHITE PAPER: Not all standards are created equal. Some are technically elegant but achieve little market adoption. Others are broadly deployed.
Posted: 18 Jul 2008 | Published: 13 Nov 2006

Burton Group

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement