Enterprise Businesses White Papers

(View All Report Types)
Management Excellence: The Metrics Reloaded
sponsored by Oracle Corporation
WHITE PAPER: In performance management, consistency is king. The simple sounding steps-identify and focus on value drivers, and align the organization to drive results - beg the question: What's the best performance management framework? Read this paper to learn more.
Posted: 05 May 2009 | Published: 01 Sep 2008

Oracle Corporation

The Need for Profitability and Cost Management
sponsored by Oracle Corporation
WHITE PAPER: Profitability and cost management (PCM) is at the core of enterprise performance management, as it represents the bottom line for every company. However, there are multiple reasons why PCM is of particular relevance, especially today. Ready this white paper to learn more.
Posted: 05 May 2009 | Published: 01 Sep 2008

Oracle Corporation

Lloyds Banking Group
sponsored by Hitachi Vantara
WHITE PAPER: Following the integration between Lloyds TSB and HBOS in 2009, the newly formed Lloyds Banking Group emerged as the UK’s largest retail bank. Read this white paper to learn how they used virtualisation to ensure its Wholesale Markets and Treasury and Trading (WMTT) department could operate at an enterprise level.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Hitachi Vantara

Text Analytics: Two Worlds Collide
sponsored by SAS
WHITE PAPER: We're all suffering from information overload. We can’t consume the volume of information that we receive every day, so if we think it might be valuable, we try to file it in a safe place for use at some time in the future. Read this white paper to learn more about the latest mashup for business analysts, Text Analytics.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

SAS

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

Getting Started with Microsoft Windows Server 2008 Hyper-V on Dell Servers
sponsored by Dell EMC and Microsoft
WHITE PAPER: This article provides an introduction to Hyper-V virtualization, discusses the overall architecture and underlying technologies, and offers guidance on best practices for deployment on Dell PowerEdge servers.
Posted: 19 Nov 2010 | Published: 19 Nov 2010

Dell EMC and Microsoft

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by OpenText Security Solutions
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

OpenText Security Solutions

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks

How the Convergence of Cloud, Big Data, Mobile, and Social Forces Impacts Global Business
sponsored by IBM
WHITE PAPER: This white paper details the results of a survey of IT professionals from around the world regarding the business impact of cloud, big data, mobile, and social forces.
Posted: 16 Jun 2014 | Published: 13 May 2014

IBM

IT Security. Fighting the Silent Threat
sponsored by Kaspersky
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky