Home
 > Research and Reports > White Papers
Keyword Search:

White Papers

Browse this free online library for the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.



Demystifying Data Science as a Service (DaaS)
Source: Simple Analytics With advancements in technology, data science capability and competence is becoming a minimum entry requirement in areas which have not traditionally been thought of as data-focused industries. As more companies perceive the significance of real-time data capture and analysis, data as a service will become the next big thing. India is now the third largest internet user after China and the U.S., and the Indian economy has been growing rapidly. Read this white paper to find out more about how data SaaS is set to become a vital part of business intelligence and analytics, and how India will play a role in this trend. Read More...
Vulnerabilities—The World Through the Eyes of Hackers
Source: EdgeWave Vulnerabilities are becoming even more fundamental in the world of cyber-security. Hackers or attackers see vulnerabilities all around them, knowing they are key to achieving their goals. This white paper will help you to understand the key fundamentals of the attacker view and build and maintain powerful security profiles so you can turn the tides of battle. Read More...
E-Policy Best Practices
Source: EdgeWave This business guide by ePolicy Institute and EdgeWave Inc. provides best-practices guidelines for developing and implementing effective workplace e-policies, and in the process, creating clean, compliant, safe and secure electronic communications that are less likely to trigger a workplace lawsuit, regulatory investigation, security breach, or other electronic disaster. Read More...
Beyond Spam – Email Security in the Age of Blended Threats
Source: EdgeWave Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them. Read More...
6 Important Steps to Evaluating a Web Security Solution
Source: EdgeWave Whether you are evaluating a Web security solution for the first time or are looking around because your current solution is less than optimum, knowing what to look for can save you money and frustration in the long run. This white paper from EdgeWave offers the key steps to evaluating a Web security solution for IT professionals, to help you size up competitve offerings and understand new approaches to basic problems of authentication and authorization, vulnerability assessment, malware protection, and Web 2.0 control. Read More...
Course Correction in QA Process Implementation
Source: Professional Resource Group LCC Course Correction is an expected part of any software development process. The process listed below outlines a process that allows one to review task assumptions, review accountability, reevaluate schedules, and monitor and control activities through the course correction process. Read More...
What Is EDI?
Source: ProcessPro Software Electronic data interchange (EDI) is a general term used to explain computer-to-computer exchange of routine business documents, using an approved, standard format, without human intervention. Understanding your primary goal is vital when beginning to implement an EDI system. Find out how your business can run more efficiently and effectively with an EDI solution. Read More...
The Key to Successful ERP Implementation
Source: ProcessPro Software A successful enterprise resource planning (ERP) solution can grow your business’ bottom line by increasing your company’s revenues and improving your company’s efficiencies. One of the most significant factors contributing to its success is the experience and support the vendor provides through its staff and implementation process. Read this white paper to learn how a thorough plan can guide you through the implementation process. Read More...
Recall Preparedness
Source: ProcessPro Software Process manufacturers know that product recalls or recall threats are an inevitable part of business. Manual methods for instituting a recall are no longer sufficient; manufacturers need the ability to start, track, stop, and even prevent a recall. New software developments have given manufacturers the ability to identify, notify, remove, and replenish any recalled product. Download this white paper to learn more. Read More...
Process vs. Discrete
Source: ProcessPro Software When researching the right enterprise resource planning (ERP) software for your business, it is essential to realize there is a difference between process and discrete ERP software. The first step is to identify the type of manufacturing operation, either process or discrete, and specific manufacturing requirements. This white paper will help you determine if your software is truly meeting your process manufacturing needs. Read More...
|< <  1 2 3 4 5 6 7 8 9 10 ...  > >|
Results 1 - 10 of 4516

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.