Document Style Semantics and Specification Language White Papers

(View All Report Types)
Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Magic Quadrant for Mobile Device Management Software
sponsored by IBM
WHITE PAPER: This Magic Quadrant for mobile device management software explores the top vendors' MDM offerings. Discover the strengths and cautions associated with each MDM vendor to see which one is right for you, or if your current vendor is living up to its competition.
Posted: 13 Aug 2013 | Published: 31 Dec 2012

IBM

Leveraging Transactional Email for Success
sponsored by SendGrid
WHITE PAPER: Discover proven tips for successfully leveraging transactional emails to increase customer engagement and market your applications in this essential resource. Find out how you can leverage a cloud-based email platform to ensure reliable delivery and gain real-time analytics.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

SendGrid

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell EMC and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell EMC and Microsoft

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

HP Server Automation Virtual Appliance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Read this exclusive white paper to find out the key features of HP's latest server automation software.
Posted: 27 Feb 2014 | Published: 31 May 2013

Hewlett Packard Enterprise

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett Packard Enterprise

Plan for Success when Migrating from GroupWise to Office 365
sponsored by Dell Software
WHITE PAPER: Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Dell Software