SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Motorola's Wireless Broadband Indoor/Outdoor Solution
sponsored by Motorola Solutions
WHITE PAPER:
With a Wi-Fi network, businesses can increase the efficiency of their mobile employees resulting in increased ROI and greater profitability. This document highlights two specific indoor/outdoor Wi-Fi network configurations based on Motorola's MOTOMESH Duo product solution.
Posted: 28 Apr 2009 | Published: 02 Apr 2009
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Emerging Multicast VPN Applications
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This paper provides background information on MVPNs, as well as describes emerging MVPN applications.
Posted: 25 Nov 2008 | Published: 25 Nov 2008
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 08 Feb 2021 | Published: 14 Mar 2016
|
|
|
Fortinet Unified Secure Access Service Edge
sponsored by Fortinet, Inc.
ANALYST REPORT:
Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.
Posted: 18 Dec 2024 | Published: 04 Dec 2024
|
|
|
Zscaler Zero Trust Exchange
sponsored by Zscaler
RESEARCH CONTENT:
CyberRatings.org evaluated Zscaler Zero Trust Exchange using their SSE Threat Protection Methodology v2.1. The product excelled in handling TLS/SSL cipher suites, blocking exploits and malware, and resisting evasion techniques. Performance metrics for HTTP/HTTPS capacity and file downloads were assessed. Read the report for detailed results.
Posted: 04 Mar 2025 | Published: 04 Mar 2025
|
|
|
Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER:
This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 26 Feb 2025 | Published: 21 Feb 2025
|
|
|
Securing AI workloads on Dell PowerEdge with Intel® Xeon® processors using Intel® Trust Domain Extensions
sponsored by Dell Technologies & Intel
WHITE PAPER:
This technical white paper offers guidance on implementing strong security measures and achieving peak performance for AI workloads. It focuses on two features provided by the 5th generation Intel® Xeon® processor: implementing advanced security measures using Intel® TDX and leveraging an AI accelerator called Intel® AMX.
Posted: 21 Feb 2025 | Published: 21 Feb 2025
|
|
|
Top 10 ASEAN IT stories of 2017
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this review of the top 10 Computer Weekly articles on IT in ASEAN, we look at what countries across the region are doing to drive adoption of emerging technologies such as artificial intelligence (AI) and the internet of things (IoT), raise their cyber security capabilities amid growing cyber threats, and draw more women into the IT industry.
Posted: 08 Feb 2021 | Published: 15 Jan 2018
|
|
|
10 Most Common Azure Mistakes Made by IT Professionals
sponsored by Nerdio
WHITE PAPER:
Deploying, managing, and scaling Microsoft Azure Virtual Desktop can be a complex process for technicians at any level of experience. In this white paper, browse the top 10 most common mistakes IT professionals make in Microsoft Azure.
Posted: 02 Nov 2023 | Published: 02 Nov 2023
|
|
|
2025 State Of Software Security a New View Of Maturity
sponsored by Veracode, Inc.
RESEARCH CONTENT:
This report analyzes software security trends, showing progress and challenges. OWASP Top 10 pass rates improved, but fix times increased. It examines flaw prevalence, fix capacity, and security debt in organizations. Key metrics benchmark performance and guide improvement. Read the full report for insights on enhancing your security program.
Posted: 06 Mar 2025 | Published: 07 Mar 2025
|
|
|
Migrate VMs From VMware to KVM
sponsored by StorPool
EBOOK:
Read this detailed Migrate VMs to KVM: A how-to guide to understand the benefits and process of migrating VMs from common hypervisors to cloud-first stacks powered by KVM. It includes a detailed step-by-step process and a Command List.
Posted: 09 Jul 2024 | Published: 09 Jul 2024
|
|
|
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
sponsored by Fabric Health
EBOOK:
Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
Breaking Down JSON Web Tokens
sponsored by FusionAuth
EBOOK:
This eBook explores JSON Web Tokens (JWTs), detailing their structure, security, and best practices. Learn about JWT components, revocation strategies, and performance. Discover when and how to use JWTs in authentication systems. Read this eBook to deepen your understanding of this powerful token format.
Posted: 14 Mar 2025 | Published: 15 Mar 2025
|
|
|
The Modern Guide To OAuth
sponsored by FusionAuth
EBOOK:
This guide explores OAuth 2.0 implementation, covering authorization modes, grants, and real-world uses. It provides code examples and insights into secure authentication workflows for web and mobile apps. Learn to handle tokens, refresh access, and implement device authorization. Read this e-book to master OAuth and build secure applications.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
6 user authentication types to secure networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The goal of identity and access management is to ensure the right people have the right access to the right resources - and that unauthorised users can't get in. Learn about 6 authentication types and the authentication protocols available to determine which best fit your organisation's needs.
Posted: 15 Mar 2023 | Published: 16 Mar 2023
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018
|
|
|
CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by TechTarget ComputerWeekly.com
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 08 Feb 2021 | Published: 12 Nov 2020
|
|
|
Go Beyond HIPAA Compliance with a Data Privacy Vault
sponsored by Skyflow
WHITE PAPER:
This white paper explores how Skyflow's Healthcare Data Privacy Vault goes beyond HIPAA compliance, using isolation, tokenization, and redaction to secure health information. Learn to implement robust data governance and enhance HIPAA compliance. Read the paper for insights.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
All resources sponsored by Skyflow
|
|
The LLM Mesh: A Practical Guide to Using Generative AI in the Enterprise
sponsored by Dataiku
EBOOK:
This data, from a 2024 Dataiku and Cognizant survey of 200 senior analytics and IT leaders, highlights that GenAI is a top priority at the highest level — nearly three-quarters of respondents (73%) will spend over $500,000 on the tech in the next 12 months.
Posted: 30 Aug 2024 | Published: 30 Aug 2024
|
|
|
The Definitive Guide to Serving Open Source Models
sponsored by Predibase
EBOOK:
This e-book explores strategies for optimizing small language model inference, covering reliability, performance, and cost efficiency. Learn about GPU autoscaling, Turbo LoRA, FP8 quantization, and LoRA Exchange for better throughput and resource management. Discover how to build robust AI infrastructure for enterprise deployments.
Posted: 09 Mar 2025 | Published: 10 Mar 2025
|
|
|
The Big Book of Genai 5 Ways to Leverage Your data to build Production-Quality GenAl Applications
sponsored by DataBricks
EBOOK:
This 118-page e-book is a thorough guide to deploying GenAI applications. It details the entire GenAI process, from using foundation models to custom model pretraining and fine-tuning. Access the full e-book now to learn how you can unlock the potential of GenAI for your organization.
Posted: 07 May 2024 | Published: 21 Feb 2025
|
|
|
9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022
|
|
|
Recruiting Email Outreach Benchmarks and Best Practices
sponsored by GEM
EBOOK:
Discover best practices for effective recruiting email outreach, including optimal send times, subject lines, and message content. Access this e-book to learn how to personalize your messaging, use data to drive results, and elevate your talent acquisition strategy.
Posted: 04 Dec 2024 | Published: 05 Dec 2024
|
|
|
CW APAC - December 2020: Trend Watch on cloud infrastructure
sponsored by TechTarget ComputerWeekly.com
EZINE:
The rise of 5G is driving telcos to embrace cloud-native and software-defined architectures. In this handbook focused on cloud infrastructure in the Asia-Pacific region, Computer Weekly looks at the slow and steady path businesses are taking to cloud-based radio access networks.
Posted: 08 Feb 2021 | Published: 17 Dec 2020
|
|
|
Authentication Best Practices: On and Off the Cloud
sponsored by HID Global
EGUIDE:
Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 08 Feb 2021 | Published: 12 Oct 2016
|
|
|
AI Model Comparison: How to choose the best AI for you
sponsored by Luware
BUYER'S GUIDE:
Explore a comprehensive comparison of AI models to find the best fit for your business needs. Discover key factors like accuracy, speed, scalability, and cost. Learn how leading AI models from Microsoft, Google, and AWS performed in a real-world email analysis scenario. Read the full Buyer's Guide to make an informed decision.
Posted: 20 Feb 2025 | Published: 21 Feb 2025
|
|