Software Utilities Reports

A case study in critical infrastructure interdependency
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

Building your road map to cloud
sponsored by Hewlett Packard Enterprise
PODCAST: Many organizations understand the core benefits of the cloud, but there remains a level of uncertainty about how to begin to leverage cloud. We help organizations plan their cloud strategy.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

Hewlett Packard Enterprise

Chapter 3: SaaS on the Rise, but Does It Deliver?
sponsored by TechTarget Customer Experience
EBOOK: The emergence of Software as a Service-based applications has enabled organizations to get new applications up and running quickly and cheaply, saving resources for mission-critical tasks.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

TechTarget Customer Experience

Check Amount Recognition Based on the Cross Validation of Courtesy and Legal Amount Fields
sponsored by Parascript LLC
WHITE PAPER: This paper is devoted to the description of the check reading system developed to recognize amounts on American personal checks.
Posted: 25 Aug 2002 | Published: 01 Jan 1999

Parascript LLC

The Evolution of Enterprise File Sync and Share
sponsored by ibm box
EGUIDE: Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.
Posted: 22 Nov 2016 | Published: 16 Nov 2016

ibm box

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security

Building the Business Case for Enterprise File Sync-and-Share
sponsored by Nasuni
WHITE PAPER: Based on market research, this guide uncovers the many purchase drivers nudging organizations in the direction of EFSS. Read on, as the content inside covers the features businesses are looking for in EFSS, the business problems EFSS can solve, the risks of going without EFSS (9 are detailed inside), and more.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Leveraging Clustered File System Software to Deliver Superior Application Availability
sponsored by Symantec Corporation
WHITE PAPER: Transactional application availability is more important than ever to businesses in a globalized economy. This Vendor Spotlight examines the various architectural approaches to ensuring application uptime and availability, particularly a clustered file system approach with clustered services.
Posted: 28 Dec 2010 | Published: 28 Dec 2010

Symantec Corporation

Policy-based Compliance Protects Enterprise Imaging and Printing Data
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This exclusive paper examines a policy-based imaging and printing compliance solution that can help your keep the critical data you print safe and secure.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Hewlett-Packard Enterprise