Virtual Sequential Access Method White Papers

(View All Report Types)
BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER: Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Mapping Security for your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

SaaS vs. Premise-based Monitoring: 9 Reasons Why SaaS Makes More Sense
sponsored by LogicMonitor
WHITE PAPER: Access this resource for the 9 benefits of SaaS, and to find out why server and network monitoring is ideal for a cloud-based model.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

LogicMonitor

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Why Do Techies Tell Me to Ping a Website?
sponsored by Global Knowledge
WHITE PAPER: This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Global Knowledge

Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Red Hat JBoss Business Rules Management System: Best Practices Guide
sponsored by Red Hat
WHITE PAPER: In this informative technology detail, discover best practices for development with Red Hat JBoss business rules management system. It will focus on three key areas of rules development: rule authoring, designing the domain or fact model and various aspects related to rule execution.
Posted: 07 Jun 2013 | Published: 31 Dec 2012

Red Hat