Barcode Labelling Software White Papers

(View All Report Types)
Toshiba Launches Smart Social Infrastructure Through a Flexible, Scalable Cloud Solution
sponsored by IBM
WHITE PAPER: To advance its initiative, Toshiba required a more flexible, scalable cloud solution capable of supporting a wide range of complex projects. This whitepaper highlights the cloud software Toshiba implemented to provide an extensible cloud management framework.
Posted: 10 Dec 2014 | Published: 30 Apr 2014

IBM

More Complex = Less Secure: Miss a Test Path and You Could Get Hacked
sponsored by McCabe Software, Inc.
WHITE PAPER: The same improvements that increase software performance create new security risks that IT pros must contend with. This white paper takes a closer look at the nature of software complexity and describes tactics you can implement to minimize it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

IBM Informix Genero
sponsored by IBM
WHITE PAPER: Capitalise on application development and deployment software today and take advantage of its easy-to-use graphical tools to model apps and then deploy them across several platforms. Read this brief yet informative paper now and learn how this software can reduce development costs and improve productivity, modernise existing 4GL apps and more.
Posted: 20 Mar 2012 | Published: 16 Mar 2011

IBM

How Mobile Backend as a Service (MBaaS) Can Unleash Apps for the New Style of IT
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Mobile Backend as a Service is a set of cloud-based, server-side mobile services for multiple platforms that can be used as a back end for your mobile apps. Find out how it can benefit you.
Posted: 02 Sep 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

IDC link software appliances ease cloud application deployment
sponsored by SUSE
WHITE PAPER: Like most new technology, cloud computing does not come without a certain level of complexity. This white paper evaluates the key drivers for cloud computing and explains how certain software appliances can simplify cloud implementation and accelerate your initiative.
Posted: 13 Jun 2012 | Published: 01 Jan 2012

SUSE

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Solihull Council Marks a Decade with Red Hat Open Source Technology , Saving over £1 Million
sponsored by Red Hat - HPE
WHITE PAPER: In this informative paper, learn why a government industry has relied on the same Linux solution for the past ten years, using an open source model to simplify software and hardware implementations, reduce costs, and more.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

Cloud Computing and SaaS: A Practical Guide for Financial Professionals
sponsored by Host Analytics, Inc
WHITE PAPER: This white paper looks at cloud-computing and software-as-a-service (SaaS) technologies and what you need to know about these emerging trends.
Posted: 12 Apr 2012 | Published: 16 Sep 2010

Host Analytics, Inc

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett Packard Enterprise
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett Packard Enterprise

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.