Pull Technology Software White Papers

(View All Report Types)
How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links
sponsored by Mimosa Systems
WHITE PAPER: This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange.
Posted: 07 Oct 2008 | Published: 03 Oct 2008

Mimosa Systems

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER: Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007

Information Builders

Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER: Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009

Cenzic

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

MD3000 and MD3000i: Array Tuning Best Practices
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper provides an overall approach to tuning I/O performance and also provides specific guidelines for using the storage array tuning controls.
Posted: 17 Sep 2008 | Published: 16 Sep 2008

DellEMC and Intel®

Leverage ERP for Sales & Operations Planning
sponsored by IFS
WHITE PAPER: Read this white paper to learn how to use your ERP to facilitate Sales and Operations Planning (S&OP), which helps manufacturers rapidly adjust to changes in the market.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

IFS

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Solution Guide - Choosing Storage for Dell Database Solutions with Dell™ PowerVault™ and Dell/EMC Storage
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper provides a guide for choosing an appropriate storage architecture for Dell Database Solutions deployed on Dell PowerEdge servers with Dell PowerVault and Dell/EMC storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®