e-Form Software White Papers

(View All Report Types)
Create and Print Salesforce Reports Anywhere, Anytime
sponsored by Canon Information & Imaging Solutions
WHITE PAPER: Access this informative resource to learn how Forms and Print Services for Salesforce allows you to translate your Salesforce data into easy-to-create, engaging, visually-oriented reports. With mobile connectivity, you can print on-the-go, so you never have to scramble for a printer,
Posted: 13 Aug 2013 | Published: 31 May 2013

Canon Information & Imaging Solutions

Forms and Print Services for Salesforce
sponsored by Canon Information & Imaging Solutions
WHITE PAPER: This resource introduces Forms and Printing Services for Salesforce, a cloud-based service that allows you to create attention-grabbing reports and forms quickly and easily, from any mobile device.
Posted: 12 Aug 2013 | Published: 30 Nov 2012

Canon Information & Imaging Solutions

Alleviating Infopath Anxiety with K2 Smartforms
sponsored by K2
WHITE PAPER: Microsoft recently announced that it would no longer be investing in InfoPath, a software app for designing and distributing forms containing structured data. This white paper addresses enterprise forms scenarios, capabilities, and technology requirements that all forms platforms should meet.
Posted: 26 Jun 2014 | Published: 31 Dec 2013

K2

FlexiCapture Drives Business For the Insurance Industry
sponsored by ABBYY
WHITE PAPER: Insurance agents across the country are saving time, saving money and writing more business using AppReader: The automated form conversion solution that allows applications to upload instantly to carrier systems, regardless of agency management system. Read on and find how how AppReader can benefit your business.
Posted: 23 Feb 2011 | Published: 23 Feb 2011

ABBYY

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing
sponsored by Tasktop
WHITE PAPER: This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Tasktop

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Symantec Corporation

Project Management and Collaborative Communication
sponsored by Tasktop
WHITE PAPER: This white paper explores how to create a connected software lifecycle to overcome data silos and enable end-to-end visibility for project management. Learn how to connect information across teams and departments to enhance project collaboration and create the communication that digital transformations, Agile, and DevOps principles demand.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Tasktop

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro