Internet Utilities White Papers

(View All Report Types)
Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
sponsored by OpenText Security Solutions
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012

OpenText Security Solutions

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

Multiple Job Scheduling Environments
sponsored by RevSoft
WHITE PAPER: Most companies have separate Environments for their Enterprise Resource Planning. In this paper learn how Rev Scheduler comes shipped with multiple Environments so even at initial installation you have a multiple Environment Scheduler in place.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

Effectively Treating the Dreadful Blight of File Bloat
sponsored by Neuxpower
WHITE PAPER: Access this expert paper to learn more about the worst file bloat offenders, the dire consequences of file bloat, file bloat work-arounds, and much more.
Posted: 22 Jun 2010 | Published: 22 Jun 2010

Neuxpower

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Leveraging Clustered File System Software to Deliver Superior Application Availability
sponsored by Symantec Corporation
WHITE PAPER: Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.
Posted: 28 Dec 2010 | Published: 28 Dec 2010

Symantec Corporation