Maintenance, Repair, and Operating Inventory Software White Papers

(View All Report Types)
Successfully Mitigating Corporate Risk
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
Posted: 06 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

Solihull Council Marks a Decade with Red Hat Open Source Technology , Saving over £1 Million
sponsored by Red Hat - HPE
WHITE PAPER: In this informative paper, learn why a government industry has relied on the same Linux solution for the past ten years, using an open source model to simplify software and hardware implementations, reduce costs, and more.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

MicroStrategy Mobile QuickStrike
sponsored by MicroStrategy
WHITE PAPER: The following white paper introduces a mobile application development solution that can allow you to build, deploy, utilize, and capitalize on mobile applications without having to rely on IT for help.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

MicroStrategy

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Why Choose Rapid Deployment for SAP?
sponsored by itelligence, Inc.
WHITE PAPER: In this white paper, learn how a rapid-deployment technology enables you to achieve faster time-to-value with your applications, respond quickly to changing business needs, and maximize new opportunities.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

itelligence, Inc.

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

Information-Driven Apps: The Evolution of the Dashboard
sponsored by MicroStrategy
WHITE PAPER: The following white paper explores a dashboard engine that allows organizations to create exception information-driven applications in a code-free, replicable, and maintainable manner. Read on to learn more.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

MicroStrategy

Performance Analysis - Unified Virtual Infrastructure Backup
sponsored by Dell Software
WHITE PAPER: This informative paper explores two backup and recovery software solutions built for today's virtualized environments. Discover what each of them has to offer, how they stack up against each other and find out which one triumphs over the other. Read on to learn more.
Posted: 03 Oct 2013 | Published: 21 Aug 2013

Dell Software

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM