DAT Players White Papers

(View All Report Types)
Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
sponsored by Coupa
WHITE PAPER: While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Coupa

Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER: This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by DellEMC and Intel®
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

DellEMC and Intel®

Unlocking the Full Power of Massive Parallelism: Solving the Network Bottleneck in MPP Databases
sponsored by Aster Data Systems
WHITE PAPER: This paper describes the technical limitations inherent in the architecture of traditional databases and other MPP (massive parallel processing) alternatives.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

Aster Data Systems

Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution
sponsored by Red Hat and Intel
WHITE PAPER: This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Red Hat and Intel

Disaster Recovery Solutions from VMware: Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER: VMware Infrastructure is transforming the way disaster recovery is done today and in the future; it changes the disaster recovery paradigm to one that is cost effective, rapid and reliable.
Posted: 20 Oct 2008 | Published: 18 Oct 2008

VMware, Inc.

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Dell PowerEdge C8000 Series: Flexible, Powerful, and Efficient
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this brief resource to learn about the Dell PowerEdge C8000 – the only shared infrastructure which enables organizations to easily reconfigure, refresh and scale out as needed.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Dell, Inc. and Intel®

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc