Uudecode White Papers

(View All Report Types)
Optimizing the Virtual Environment
sponsored by uptime software inc.
WHITE PAPER: In this white paper, you'll find both the pitfalls of virtual monitoring and management, and how to navigate the maze of competing virtual monitoring and management vendors. In the end, you'll have a clear idea of what solutions will work for you.
Posted: 29 Sep 2010 | Published: 29 Sep 2010

uptime software inc.

Software Security Analysis: Control Flow Security Analysis with McCabe IQ
sponsored by McCabe Software, Inc.
WHITE PAPER: Read this white paper to learn how comprehensive security analysis equips you with the proper insight into the structure of your software code to identify and resolve possible security holes
Posted: 17 Apr 2012 | Published: 17 Apr 2012

McCabe Software, Inc.

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

Red Hat JBoss Business Rules Management System: Best Practices Guide
sponsored by Red Hat
WHITE PAPER: In this informative technology detail, discover best practices for development with Red Hat JBoss business rules management system. It will focus on three key areas of rules development: rule authoring, designing the domain or fact model and various aspects related to rule execution.
Posted: 07 Jun 2013 | Published: 31 Dec 2012

Red Hat

Clabby: Business analytics buying criteria: The Three Maxims
sponsored by IBM.
WHITE PAPER: View this white paper to learn more about what contributes to an effective business analytics buying criteria. It examines the importance of implementing an integrated infrastructure and its relationship to business analytics.
Posted: 22 May 2013 | Published: 17 May 2013

IBM.

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Leveraging Transactional Email for Success
sponsored by SendGrid
WHITE PAPER: Discover proven tips for successfully leveraging transactional emails to increase customer engagement and market your applications in this essential resource. Find out how you can leverage a cloud-based email platform to ensure reliable delivery and gain real-time analytics.
Posted: 23 Apr 2012 | Published: 20 Apr 2012

SendGrid