Beginners All-purpose Symbolic Instruction Code White Papers

(View All Report Types)
Performance Analysis - Unified Virtual Infrastructure Backup
sponsored by Dell Software
WHITE PAPER: This informative paper explores two backup and recovery software solutions built for today's virtualized environments. Discover what each of them has to offer, how they stack up against each other and find out which one triumphs over the other. Read on to learn more.
Posted: 03 Oct 2013 | Published: 21 Aug 2013

Dell Software

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Mobile Load Testing Challenges
sponsored by Neotys
WHITE PAPER: Developers have seen an increase in the number of mobile projects; however, their load testing tactics have not adapted to facilitate the new popularity. This whitepaper discusses seven key steps to successfully testing and analyzing your organization's mobile load capabilities.
Posted: 11 Aug 2014 | Published: 31 Dec 2011

Neotys

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

Can the Suite Compete? - What Every Recruiter Needs to Know
sponsored by Jobvite
WHITE PAPER: In this resource, HR and business leaders will find a comparison of the strengths and weaknesses of purpose-specific software and bundled software suites, providing you with key information to help you more strategically meet your organization's talent recruitment goals.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

Jobvite

Magic Quadrant for Mobile Device Management Software
sponsored by IBM
WHITE PAPER: This Magic Quadrant for mobile device management software explores the top vendors' MDM offerings. Discover the strengths and cautions associated with each MDM vendor to see which one is right for you, or if your current vendor is living up to its competition.
Posted: 13 Aug 2013 | Published: 31 Dec 2012

IBM

The 10 Commandments of a Successful Oracle E-Business R12 Upgrade
sponsored by Dell Software
WHITE PAPER: This white paper provides 10 key best practices to help your organization effectively manage change to your enterprise resource planning (ERP) systems, with particular attention to upgrading to R12.
Posted: 22 Sep 2011 | Published: 04 Oct 2011

Dell Software

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork