Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER:
With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
sponsored by Fabric Health
EBOOK:
Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
Migrate VMs From VMware to KVM
sponsored by StorPool
EBOOK:
Read this detailed Migrate VMs to KVM: A how-to guide to understand the benefits and process of migrating VMs from common hypervisors to cloud-first stacks powered by KVM. It includes a detailed step-by-step process and a Command List.
Posted: 09 Jul 2024 | Published: 09 Jul 2024
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
AI-Ready Workstations for Power Users
sponsored by Dell Technologies and Intel
ANALYST REPORT:
This 2024 IDC InfoBrief explores how AI-ready workstations can accelerate productivity. Read on to access insights for decision-makers, the C-suite, IT department managers and advanced PC users.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
AI-Ready Workstations for Power Users
sponsored by Dell Technologies and Intel
ANALYST REPORT:
This 2024 IDC InfoBrief explores how AI-ready workstations can accelerate productivity. Read on to access insights for decision-makers, the C-suite, IT department managers and advanced PC users.
Posted: 18 Nov 2024 | Published: 18 Nov 2024
|
|
|
Top 10 ASEAN IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications
sponsored by DataBricks
EBOOK:
This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
Posted: 07 May 2024 | Published: 07 May 2024
|
|
|
Annual Report On The State Of Application Security
sponsored by Veracode
ANALYST REPORT:
In the current spectrum of cybersecurity, organizations are continuously trying to reduce their security debt, but what is just as important is to not introduce security flaws that can accumulate over the life of your applications, making them more vulnerable in the long run. Read on to learn more about the current state of application security.
Posted: 09 Jun 2023 | Published: 09 Jun 2023
|
|
|
Multi-Factor Authentication Deployment Guide
sponsored by Okta
WHITE PAPER:
Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024
|
|
|
The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK:
This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024
|
|
|
CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020
|
|
|
Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
sponsored by Red Hat
EBOOK:
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
Posted: 16 Apr 2024 | Published: 16 Apr 2024
|
|
|
Identity Security for Software Development
sponsored by CyberArk
EBOOK:
Whether you’re just starting your coding journey or a seasoned veteran, this e-book serves as a comprehensive resource for those who want to develop a deep understanding of secure coding principles and best practices. Read the O’Reilly e-book to understand today’s identity security and secure development essentials.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
Keys-in-the-Wild
sponsored by Merlin International
WHITE PAPER:
The "Keys-in-the-Wild" problem highlights how cryptographic keys can be exploited by malicious actors when not properly managed. Learn how to implement Zero Trust principles to discover, protect, and continuously monitor cryptographic assets and prevent unauthorized access. Read the full white paper to discover best practices.
Posted: 11 Sep 2024 | Published: 12 Sep 2024
|
|
|
Recruiting Email Outreach Benchmarks and Best Practices
sponsored by GEM
EBOOK:
Discover best practices for effective recruiting email outreach, including optimal send times, subject lines, and message content. Access this e-book to learn how to personalize your messaging, use data to drive results, and elevate your talent acquisition strategy.
Posted: 04 Dec 2024 | Published: 05 Dec 2024
|
|
|
CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE:
The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020
|
|
|
Case Study: Auto Trader UK cuts IT resource use through Google Cloud, Kubernetes and Istio adoption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Auto Trader is the UK's biggest online marketplace for new and used car sales. Its head of infrastructure sets out how cloud, containers and microservices will help reinforce its market-leading position in the years to come
Posted: 08 Feb 2021 | Published: 09 May 2019
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Unknown SDLC Risks Legit Uncovers
sponsored by Legit Security
WHITE PAPER:
Uncover the top 6 unknown risks in your software development lifecycle, including exposed secrets, unknown build assets, and misconfigured infrastructure. Learn how to secure your software factory from end to end. Read the full White Paper.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Observability for Large Language Models
sponsored by Honeycomb
EBOOK:
“As organizations eagerly embrace the potential of LLMs,” this e-book explains, “the need to understand their behavior in production and use that understanding to improve development with them has become apparent.” Step in observability, here to help you develop and deepen your understanding of LLMs. Read on to learn more.
Posted: 09 Apr 2024 | Published: 10 Apr 2024
|
|
|
Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016
|
|
|
The Cybersecurity Investment gap: Navigating the Shifting Threat Landscape
sponsored by One Identity
WHITE PAPER:
The cybersecurity investment gap is widening as the threat landscape rapidly evolves. This white paper explores the expanding attack surface, rising breach costs, and limitations of current security strategies. Learn how to build a more proactive, unified security approach to protect your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Anatomy Of Identity Based Attacks
sponsored by Okta
WHITE PAPER:
74% of all breaches involve some form of human factor, whether it be error, credential theft, or social engineering. This white paper looks at the growing threats impacting organizations today, and how Okta can play a role in threat protection, detection, and response, before, during, and after the point of authentication.Read on to learn more.
Posted: 12 Apr 2024 | Published: 13 Apr 2024
|
|
|
A comparison of Azure, AWS, and Google cloud services
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
AWS, Azure, and Google are all huge names in the cloud space, offering everything from big data in the cloud to serverless computing options and more. Read on for a vendor-neutral comparison of these three providers to determine which combination – if any – best fits your organization's infrastructure requirements.
Posted: 08 Feb 2021 | Published: 12 Sep 2019
|
|
|
Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020
|
|