Checkbook Software White Papers

(View All Report Types)
A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Symantec Corporation

Best Practices for Open Source and the Cloud
sponsored by Red Hat
WHITE PAPER: This whitepaper takes a careful look at two of today's most popular topics: open source application software and moving to the cloud.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

Red Hat

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Deliver a superior experience: Application Transformation Solutions
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This brief resource introduces a holistic approach to enterprise applications that can help you bridge the gap between the old and the new to deliver the strong, positive experiences that users are looking for.
Posted: 07 Feb 2014 | Published: 31 May 2013

Hewlett-Packard Enterprise

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

The good, the bad, and the ugly of cloud applications
sponsored by Oracle Corporation
WHITE PAPER: This comprehensive research study explores the good, the bad, and the ugly of cloud applications, and describes how midsize organizations are using the cloud.
Posted: 28 Mar 2014 | Published: 30 Sep 2013

Oracle Corporation

Leveraging Transactional Email for Success
sponsored by SendGrid
WHITE PAPER: Discover proven tips for successfully leveraging transactional emails to increase customer engagement and market your applications in this essential resource. Find out how you can leverage a cloud-based email platform to ensure reliable delivery and gain real-time analytics.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

SendGrid

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett Packard Enterprise

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software