Air Traffic Control White Papers

(View All Report Types)
Cutting Through the Complexity of Multi-Protocol Label Switching (MPLS) Performance
sponsored by NetScout Systems, Inc.
WHITE PAPER: This paper outlines the best practices for collecting network and application performance information over MPLS enabled wide area networks by using the nGenius Solution's Site Monitoring feature to monitor traffic flows destined for remote sites.
Posted: 16 Jan 2006 | Published: 01 Jan 2005

NetScout Systems, Inc.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

CW@50 - What was making the news in May
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 08 Feb 2021 | Published: 09 May 2016

TechTarget ComputerWeekly.com

CW Nordics May 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.
Posted: 08 Feb 2021 | Published: 25 May 2017

TechTarget ComputerWeekly.com

IT Organizations in a Quandary Over Visibility into Cloud Traffic
sponsored by Gigamon
RESEARCH CONTENT: Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.
Posted: 29 Feb 2024 | Published: 29 Feb 2024

TOPICS:  .NET
Gigamon

Infosec culture: A former helicopter pilot's perspective
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
Posted: 08 Feb 2021 | Published: 26 Mar 2018

TechTarget ComputerWeekly.com

Zero Trust Lateral Access Control
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW: Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

Sandnet++ – A framework for analysing and visualising network traffic from malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware
Posted: 08 Feb 2021 | Published: 02 Sep 2016

TechTarget ComputerWeekly.com

CW Benelux - May 2020: IT budgets up in the air as Covid-19 disrupts business
sponsored by TechTarget ComputerWeekly.com
EZINE: Computer Weekly's annual IT priorities survey was carried out before the arrival of Covid-19 disrupted business plans. It found that more than half of the IT leaders in the Benelux region expected budgets to be higher this year than last, and digital transformation was to be the main recipient of budget increases.
Posted: 08 Feb 2021 | Published: 07 May 2020

TechTarget ComputerWeekly.com

Comparing traditional WAN vs. SD-WAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While comparing traditional WAN vs. SD-WAN, network professionals can see the many benefits of SD-WAN, including centralized control and dynamic traffic management.
Posted: 08 Feb 2021 | Published: 10 Feb 2020

TechTarget ComputerWeekly.com

Gigamon taps eBPF to inspect encrypted traffic with Precryption technology
sponsored by Gigamon
ANALYST REPORT: Network traffic monitoring faces challenges with encrypted traffic and hybrid cloud environments. Gigamon's Precryption technology leverages eBPF to inspect encrypted traffic before or after encryption, providing visibility without decryption. Read the full analyst report to learn more about this innovative approach.
Posted: 09 Jul 2024 | Published: 10 Jul 2024

Gigamon

Alteon Stackable Web Switches 180 and ACEdirector Series
sponsored by Nortel Networks Corporation
DATA SHEET: The Alteon 180 and AD series provide an ideal solution for enterprises and service providers to maximize their network and server investment.
Posted: 27 Oct 2002 | Published: 01 Mar 2002

Nortel Networks Corporation

Case Study: How Airbus handles IoT network traffic in manufacturing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The internet of things is set to power the fourth industrial revolution, providing data to optimise manufacturing. Airbus is starting to put sensors in aircraft assembly
Posted: 08 Feb 2021 | Published: 09 May 2019

TechTarget ComputerWeekly.com

Connectivity Cloud: A Way To Take Back IT And Security Control
sponsored by Cloudflare
WHITE PAPER: Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.
Posted: 13 Jul 2024 | Published: 13 Jul 2024

Cloudflare

Global Manufacturer Adopts Unified SASE as a Service to Secure User Access and Filter Network and Security Traffic All The Time from Anywhere
sponsored by Aryaka
CASE STUDY: Lauridsen Group International, a global manufacturer, adopted Aryaka's Unified SASE to secure user access and filter network traffic across its 60+ locations. The solution reduced management complexity, cut costs, and enabled faster site deployments. Read the full case study to learn more.
Posted: 02 Oct 2024 | Published: 03 Oct 2024

Aryaka

Essential Guide to Software Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
Posted: 08 Feb 2021 | Published: 12 Feb 2018

TechTarget ComputerWeekly.com

Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 08 Feb 2021 | Published: 18 Jan 2021

TechTarget ComputerWeekly.com

Dell Smart Cooling Technology
sponsored by Dell Technologies and Intel
PRODUCT OVERVIEW: PowerEdge servers are designed with Smart Cooling which uses state-of-the-art thermal technologies with intelligent control systems to ensure optimal cooling and sustained system performance. Check out this overview for a quick guide to Smart Cooling.
Posted: 09 Sep 2024 | Published: 09 Sep 2024

Dell Technologies and Intel

CW APAC: Trend Watch - business response to coronavirus
sponsored by TechTarget ComputerWeekly.com
EZINE: With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.
Posted: 08 Feb 2021 | Published: 14 May 2020

TechTarget ComputerWeekly.com

The rise and rise of SD-WAN in post Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
Posted: 08 Feb 2021 | Published: 22 Jul 2020

TOPICS:  WAN
TechTarget ComputerWeekly.com

Five Critical Considerations for Choosing Your Next Application Delivery Controller
sponsored by A10 Networks
EGUIDE: ph
Posted: 17 Oct 2024 | Published: 17 Oct 2024

A10 Networks

Web security: Important but often overlooked
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
Posted: 08 Feb 2021 | Published: 24 Nov 2017

TechTarget ComputerWeekly.com

Mobile Device Management
sponsored by TeamViewer
PRODUCT OVERVIEW: Mobile devices are now an essential and integral part of the modern workplace enabling employees, contractors, and third-party vendors to access a wide variety of business-critical applications and data. Learn how a 360° mobile device management (MDM) helps you stay on top of your mobile device fleet 24/7.
Posted: 08 Dec 2023 | Published: 08 Dec 2023

TOPICS:  .NET
TeamViewer

Computer Weekly –25 April 2017: Blockchain expands reach beyond finance
sponsored by TechTarget ComputerWeekly.com
EZINE: Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Security Think Tank: Critical National Infrastructure
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.
Posted: 27 Apr 2021 | Published: 27 Apr 2021

TechTarget ComputerWeekly.com

Tape Archive Platform As-a-Service
sponsored by Spectra Logic
PRODUCT OVERVIEW: This product overview explores Tape Archive Platform As-a-Service (TAPAS), a cloud-based solution from Spectra Logic and Geyser Data that delivers enterprise-class security, reliability, and sustainability for archiving data at scale. TAPAS offers easy provisioning, fast data retrieval, and enhanced data security. Read on now to learn more.
Posted: 17 Sep 2024 | Published: 19 Sep 2024

Spectra Logic

Secure Connectivity for Devices and Users at the Network Edge
sponsored by Cradlepoint
EBOOK: Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
Cradlepoint