RMI White Papers

(View All Report Types)
Performance Analysis - Unified Virtual Infrastructure Backup
sponsored by Dell Software
WHITE PAPER: This informative paper explores two backup and recovery software solutions built for today's virtualized environments. Discover what each of them has to offer, how they stack up against each other and find out which one triumphs over the other. Read on to learn more.
Posted: 03 Oct 2013 | Published: 21 Aug 2013

Dell Software

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett Packard Enterprise

MAXIMIZE THE VALUE OF YOUR APPLICATIONS WITH FUSION MIDDLEWARE
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores the challenges of operating multiple applications simultaneously. Find out how you can improve efficiency and reduce risk with a pre-integrated application infrastructure.
Posted: 02 Aug 2012 | Published: 01 Jun 2010

Oracle Corporation

Paying a Fair Price for Data Backup
sponsored by Asigra
WHITE PAPER: This informative paper explores a new enterprise backup licensing model based on recovery. Discover how this approach ensures you're paying a fair price for your data backup and recovery and protects your information, no matter what. Read on now to learn more.
Posted: 31 Oct 2013 | Published: 30 Sep 2013

Asigra

Plan for Success when Migrating from GroupWise to Office 365
sponsored by Dell Software
WHITE PAPER: Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Dell Software

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Composite applications - Break the delivery logjam with HP Service Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This whitepaper takes a look at service virtualization, and how it can speed application development by replicating unavailable components, and improve quality control with multiple scenario testing.
Posted: 07 Nov 2013 | Published: 03 Dec 2012

Hewlett Packard Enterprise

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Making the Business Case for Two-Tier ERP
sponsored by Infor
WHITE PAPER: In this e-book learn how to analyze costs and benefits to make an effective business case for two-tier ERP.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Infor