ksh White Papers

(View All Report Types)
IBM PureFlex Systems with VMWare: Cloud-ready virtualization with the flexibility of an expert integrated system
sponsored by IBM
WHITE PAPER: This resource explores the benefits of combining IBM PureFlex System with VMware. Inside, discover how you can implement a reliable cloud-ready infrastructure with integrated hardware and software designed for efficient virtualization. Discover if this combination will bring the benefits your organization needs.
Posted: 15 Jul 2013 | Published: 30 Apr 2012

IBM

The Role of the Operating System in Cloud Environments
sponsored by Red Hat
WHITE PAPER: Download this exclusive whitepaper today and discover the crucial elements you need to consider to create an operationally sophisticated hybrid cloud computing environment.
Posted: 10 Dec 2013 | Published: 31 Dec 2011

Red Hat

Mobile Load Testing Challenges
sponsored by Neotys
WHITE PAPER: Developers have seen an increase in the number of mobile projects; however, their load testing tactics have not adapted to facilitate the new popularity. This whitepaper discusses seven key steps to successfully testing and analyzing your organization's mobile load capabilities.
Posted: 11 Aug 2014 | Published: 31 Dec 2011

Neotys

Which Operating System is Right for your Business Needs?
sponsored by Red Hat
WHITE PAPER: This white paper talks about the challenges of migrating from Solaris 10 to Solaris 11 and highlights the benefits of migrating from Solaris to Red Hat Enterprise Linux instead.
Posted: 09 Apr 2014 | Published: 30 Dec 2011

Red Hat

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Why Do Techies Tell Me to Ping a Website?
sponsored by Global Knowledge
WHITE PAPER: This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Global Knowledge

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

IBM Z Mainframes Are Back
sponsored by Beta Systems
WHITE PAPER: Read this interview with Ross Mauri, general manager of IBM's Z and LinuxOne mainframe business, to learn what’s fueling IBM’s mainframe revitalization; and what that means for mainframes moving forward.
Posted: 04 Nov 2021 | Published: 30 Oct 2020

Beta Systems