csh White Papers

(View All Report Types)
How to implement virtualization on a budget
sponsored by HPE and Intel®
WHITE PAPER: Access this exclusive resource to find out how the combination of HP's converged infrastructure and Red Hat's virtualization software create the perfect platform for consolidating your Linux systems.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

Managing Multiple Operating Systems: Five Best Practices
sponsored by Dell Software
WHITE PAPER: Access this essential resource for best practices for managing multiple operating systems in your enterprise. Learn more about the latest trends in end point management and how to efficiently and securely run your multi-OS environment.
Posted: 31 Jul 2013 | Published: 29 Nov 2012

Dell Software

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Why Do Techies Tell Me to Ping a Website?
sponsored by Global Knowledge
WHITE PAPER: This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Global Knowledge

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Software-defined Storage: the overall benefits
sponsored by IBM
WHITE PAPER: This brief video cuts through some of the confusion surrounding SDS and tells you what to look for – and what to avoid – when choosing an SDS product.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

IBM

IBM Z Mainframes Are Back
sponsored by Beta Systems
WHITE PAPER: Read this interview with Ross Mauri, general manager of IBM's Z and LinuxOne mainframe business, to learn what’s fueling IBM’s mainframe revitalization; and what that means for mainframes moving forward.
Posted: 04 Nov 2021 | Published: 30 Oct 2020

Beta Systems

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork