Internet Piracy White Papers

(View All Report Types)
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Paths to Success: Three Ways to Innovate Your Business Model
sponsored by IBM Line of Business
WHITE PAPER: In today's ever-changing times,innovation in business models is a success differentiator for CEOs,as we learned from the IBM 2006 Global CEO Study.
Posted: 29 Nov 2007 | Published: 01 Jun 2007

IBM Line of Business

Using ICD-10 Codes and Electronic Health Records to Achieve Value
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Building a Robust Business Case for High Quality Master Data
sponsored by Melissa
WHITE PAPER: This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included.
Posted: 19 Apr 2010 | Published: 01 Feb 2010

Melissa

Smarter Products - The Building Blocks for a Smarter Planet
sponsored by IBM
WHITE PAPER: IBM offers the first integrated software platform dedicated to the delivery of smarter products, with our portfolio of software, hardware and services, IBM can help companies create and manage smarter products for a smarter planet. Read on to learn more.
Posted: 06 Oct 2009 | Published: 01 May 2009

IBM