SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER:
With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE:
The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020
|
|
|
A Computer Weekly buyer's guide to perimeterless network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 08 Feb 2021 | Published: 05 Feb 2019
|
|
|
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Practical Zero Trust Implementing Protections for High-Value Data
sponsored by Zentera Systems Inc.
EBOOK:
This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
The changing mobile platform landscape
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 08 Feb 2021 | Published: 18 Jan 2019
|
|
|
The Cloud Influence on GRC
sponsored by TechTarget Security
EBOOK:
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook.
Posted: 19 Sep 2024 | Published: 23 Apr 2014
|
|
|
CW APAC, March 2022: Trend Watch: Storage management
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.
Posted: 17 Mar 2022 | Published: 17 Mar 2022
|
|
|
IAM: Managing identity remains key to cyber security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
IT and regulatory environments are changing rapidly driven by the EU's GDPR and digital transformation that is seeing accelerated adoption of cloud and IoT-based technologies, and while identity remains key to cyber security, organisations need to reassess and adapt their identity and access management (IAM) strategies accordingly.
Posted: 08 Feb 2021 | Published: 29 Aug 2019
|
|
|
Computer Weekly - 29 October 2019: IR35 reforms - the difficult decisions facing IT contractors
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we examine the difficult choices facing UK IT contractors from the controversial IR35 tax reforms. Social engineering is a major source of cyber security attacks - we look at mitigation strategies. And the IT chief at Mercedes F1 explains what it takes to support a world championship team. Read the issue now.
Posted: 08 Feb 2021 | Published: 29 Oct 2019
|
|
|
Computer Weekly – 15 January 2019: NHS plans for a digital future
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the NHS Long-Term Plan and examine how it intends to transform UK healthcare for a digital age. We analyse the latest chip developments from Intel and AMD to see what will change in the datacentre in 2019. And we ask the experts if Amazon Web Services can continue its growth trajectory. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Jan 2019
|
|
|
How to achieve network infrastructure modernization
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Upgrading to advanced network infrastructure involves firms being able to deliver mission-critical services through cloud providers and through their own cloud resources. Increased network infrastructure capacity need has seen deployment of optical networking and advanced network solutions such as software-defined wide area network (SDWAN).
Posted: 04 Jul 2022 | Published: 04 Jul 2022
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024
|
|
|
Top 10 storage stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.
Posted: 08 Feb 2021 | Published: 28 Jan 2020
|
|
|
Generative AI in the Enterprise with AMD Accelerators
sponsored by Dell Technologies & AMD
WHITE PAPER:
How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.
Posted: 13 Nov 2024 | Published: 13 Nov 2024
|
|
|
Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE:
This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018
|
|
|
Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017
|
|
|
Authentication After Passwords
sponsored by Okta
EBOOK:
The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
|
Computer Weekly – 30 April 2024: What's it like being the IT chief at Man Utd?
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we speak to the chief digital information officer of Manchester United Football Club to discuss the IT that keeps a premiership team running. We also investigate how well prepared the UK is for major semiconductor supply chain disruptions. Read the issue now.
Posted: 26 Apr 2024 | Published: 30 Apr 2024
|
|
|
MicroScope – March-April 2024: Is cloud the best option?
sponsored by MicroScope
EZINE:
In this issue, find out why cloud may not always be the right course of action for businesses to take. Also discover the growing threat artificial intelligence brings to the cyber security market, as well as read predictions on what areas will grow over the course of the year
Posted: 29 Feb 2024 | Published: 01 Mar 2024
|
|
|
Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
Posted: 16 Aug 2021 | Published: 17 Aug 2021
|
|
|
Computer Weekly – 10 October 2017: The most influential women in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK technology, and interview this year's winner – investor and entrepreneur Sherry Coutu – to learn her thoughts on how to improve diversity in the IT workforce. Read the issue now.
Posted: 08 Feb 2021 | Published: 06 Oct 2017
|
|
|
GigaOm Radar for Domain Name System (DNS) Security
sponsored by Cisco
ANALYST REPORT:
The domain name system (DNS) is essential yet vulnerable. This GigaOm Radar report examines 11 leading DNS security solutions, evaluating their capabilities to help you secure your network and mitigate DNS threats. Read the full report to find the right DNS security solution for your organization.
Posted: 07 Sep 2024 | Published: 07 Sep 2024
|
|
|
Top 10 ASEAN IT stories of 2022
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Despite challenges, those in ASEAN have taken things in stride as they press on with digital transformation, whether it is empowering citizen developers or building cloud-native applications. Here are Computer Weekly's top 10 ASEAN IT stories of 2022.
Posted: 15 Jan 2023 | Published: 16 Jan 2023
|
|
|
Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024
|
|