ACM White Papers

(View All Report Types)
The Connectivity Cloud
sponsored by Cloudflare
EBOOK: Organizations are losing control over their IT and security, often leading to negative effects on the business. Download this e-book to learn about the connectivity cloud, which leverages programmable architecture and network integration to help organizations regain control over their IT and Security.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Cloudflare

Connectivity Cloud: A Way To Take Back IT And Security Control
sponsored by Cloudflare
WHITE PAPER: Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

Cloudflare

10 Steps to Enhance the Agility, Security and Performance of Active Directory
sponsored by One Identity
WHITE PAPER: Microsoft Active Directory (AD) and Azure AD (AAD) bring organization and standards to how identity and account data is managed and stored. One Identity Active Roles unifies your AD and AAD environments and enables identity and account data to be managed with agility, security and speed. Read on to learn more.
Posted: 06 Jun 2024 | Published: 06 Jun 2024

TOPICS:  .NET
One Identity

AI: Innovating The Digital Revolution
sponsored by QA
WHITE PAPER: In this white paper, you'll discover how upskilling and reskilling employees can provide an affordable, sustainable, and diverse pipeline of talent for your business. You'll also learn how to leverage AI and cloud computing to transform your data and gain a competitive edge. Access the full white paper now to learn more.
Posted: 06 Sep 2024 | Published: 09 Sep 2024

QA

Multi-Factor Authentication Deployment Guide
sponsored by Okta
WHITE PAPER: Threat actors have taken advantage of hybrid work structures, ramping up social engineering initiatives with a distinct emphasis on phishing. This white paper is designed to provide best practices for fully leveraging the promise of multi-factor authentication (MFA), including upgrading to passwordless authentication. Read on to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Okta

A 3-Step Guide to Creating Authentic B2B Webinar Content
sponsored by BrightTALK by TechTarget
BRIGHTTALK: To enhance marketing and sales content, B2B companies have turned to webinars to open the floor to live engagement and reach new prospects to deliver revenue growth. However, many struggle to direct well-executed webinars and connect with their audiences. Access this guide to learn the best practices.
Posted: 16 Nov 2022 | Published: 16 Nov 2022

TOPICS:  .NET
BrightTALK by TechTarget

Royal Holloway: Secure multiparty computation and its application to digital asset custody
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: For this article in our Royal Holloway security series, the authors provide a brief overview of multiparty computation (MPC) and highlight the benefits of MPC-based bitcoin custody over traditional approaches.
Posted: 20 Apr 2022 | Published: 20 Apr 2022

TechTarget ComputerWeekly.com

Designing Customer Conversations: Best Practices
sponsored by Talkdesk
EBOOK: To design customer conversations, it’s crucial to consider the user experiences and not just the artificial intelligence that’s behind the processes. However, to do this, companies need to know the dos and don’ts for successful virtual agents, as well as the basics for creating proper customer conversations. Access the guide to learn more.
Posted: 07 Nov 2022 | Published: 07 Nov 2022

TOPICS:  .NET
Talkdesk

Responsible Generative AI Reap the Rewards, Manage the Risk
sponsored by Domino
WHITE PAPER: You’ve heard about the massive potential of GenAI. But GenAI also poses many critical challenges and risks for your organization, including a skills gap as well as extreme demands on your computing infrastructure. Download this white paper now to discover key considerations in creating a responsible GenAI strategy.
Posted: 12 Mar 2024 | Published: 12 Mar 2024

TOPICS:  .NET
Domino

CW Europe – March 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: Cities in continental Europe will be eyeing opportunities to attract more startup firms in view of the potential scenario that London and the UK more widely might lose their appeal to entrepreneurs after Brexit.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

Organizations Largely Unprepared for the Advent of 90-Day TLS Certificates
sponsored by Venafi
RESEARCH CONTENT: 73% of security leaders believe that shortening TLS certificate lifespans from 398 days to 90 days will cause chaos, according to research by Venafi. Along with digging into that widespread anxiety, this research report maps out 5 steps you can take right now to prepare for 90-day certificates. Read on to learn more.
Posted: 06 Aug 2024 | Published: 07 Aug 2024

Venafi

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Legacy PKI Migration
sponsored by Venafi
WHITE PAPER: 52% of the 2500 participants surveyed by the Ponemon Institute reported that their organizations have poor visibility of apps that rely on Public Key Infrastructure (PKI). Along with exploring that obstacle, this white paper considers other challenges that legacy PKI can pose. To unlock those insights and more, read on.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Venafi

CW Benelux February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, read about how and why one public sector IT professional in the Netherlands, Victor Gevers, took a whole year out to hack ethically and, in the process, unearthed about 1,000 vulnerabilities.
Posted: 08 Feb 2021 | Published: 01 Feb 2018

TechTarget ComputerWeekly.com

CW Nordics November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2024: Digital government on a budget
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how Labour's version of austerity will affect the government's desire for digital transformation. We find out how the use of AI in the workplace is negatively affecting low-income workers. And an SAP customer explains how it plans to keep running after the end of support for ECC. Read the issue now.
Posted: 07 Oct 2024 | Published: 08 Oct 2024

TechTarget ComputerWeekly.com

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

CW Nordics ezine February 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: In the first CW Nordics ezine of 2018, we take a look at some of the priorities of the region’s CIOs.
Posted: 08 Feb 2021 | Published: 22 Feb 2018

TechTarget ComputerWeekly.com

Embracing generative AI
sponsored by Virtusa
WHITE PAPER: For every dollar that organizations invest in AI, they are realizing an average of 3.5 times in returns, IDC found. This is one reason among many that businesses are harnessing the power of AI; yet, not all employees are equally optimistic about the innovative technology. In this research report, dig into the differing attitudes toward AI.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

Virtusa

Effortless Enterprise Deployments: Navigating Docker for Maximum ROI
sponsored by Docker
WHITE PAPER: This white paper explores how containerization with Docker can help enterprises accelerate software delivery, improve developer productivity, and realize significant ROI. Learn how Docker can streamline your development processes and modernize your IT infrastructure. Read the full white paper now.
Posted: 21 Oct 2024 | Published: 21 Oct 2024

Docker

CW Benelux May 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
Posted: 08 Feb 2021 | Published: 01 May 2018

TechTarget ComputerWeekly.com

Computer Weekly – 7 November 2017: The ethics of software development
sponsored by TechTarget ComputerWeekly.com
EZINE: Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
Posted: 08 Feb 2021 | Published: 03 Nov 2017

TechTarget ComputerWeekly.com

Unlocking value in the railway network's data
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

Unlocking value in the railway network's data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jun 2020

TechTarget ComputerWeekly.com

Technology, media and telecommunications predictions 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 08 Feb 2021 | Published: 11 Jan 2017

TechTarget ComputerWeekly.com