Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Asynchronous Telemedicine Guide + COVID-19: The Largest Case Study on Async
sponsored by Fabric Health
EBOOK:
Discover the power of asynchronous care, the most efficient care delivery method. Based on over 15 years of experience in async, this comprehensive 29-page resource includes everything you need to know to implement an effective virtual-first strategy that enhances provider capacity, expands patient access, and offers a consumer-grade experience.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
10 Fastly Next-Gen WAF Capabilities that Enable Modern AppSec
sponsored by Fastly
WHITE PAPER:
As the application development landscape evolves, software teams are struggling to secure their expanding web attack surface. Read this white paper now to find out how you can enable your developers and operations teams to deliver modern, business-critical applications and APIs, securely.
Posted: 25 Feb 2025 | Published: 26 Feb 2025
|
|
|
Contact Center Buyer’s Guide
sponsored by 8x8, Inc.
EBOOK:
In the modern business world, contact centers play a critical role in the customer experience. However, outdated legacy systems can have you running into some challenges. So, how can you meet service expectations while providing a better experience for all? Access this guide to learn more.
Posted: 05 Apr 2023 | Published: 05 Apr 2023
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Google Workspace CMMC Level 2 Conguration Guide
sponsored by Google Workspace
EBOOK:
This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.
Posted: 07 Mar 2025 | Published: 07 Mar 2025
|
|
|
Digital Transformation & Care Enablement
sponsored by Fabric Health
WHITE PAPER:
Solving healthcare's biggest challenges—including patient access and provider shortages—requires a comprehensive, virtual-first approach to care. Download Fabric's end-to-end Care Enablement Guide for a unique perspective on a unified virtual-first approach to healthcare transformation.
Posted: 26 Aug 2024 | Published: 15 Aug 2024
|
|
|
A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 06 Jul 2021 | Published: 06 Jul 2021
|
|
|
UCaaS Buyers’ Checklist
sponsored by 8x8
PRODUCT OVERVIEW:
The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.
Posted: 31 May 2024 | Published: 31 May 2024
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019
|
|
|
UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT:
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024
|
|
|
Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017
|
|
|
Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
The Definitive Guide to Hyperconverged Infrastructure
sponsored by Nutanix
WHITE PAPER:
Discover how hyperconverged infrastructure (HCI) can transform your data center. This comprehensive guide covers Nutanix's HCI solution, including features like intelligent tiering, data protection, and security. Learn how to simplify IT and focus on applications that power your business. Read the full white paper.
Posted: 04 Feb 2025 | Published: 04 Feb 2025
|
|
|
Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018
|
|
|
A Computer Weekly Buyer's Guide to Wireless Networks
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Mobile devices are increasing the pressure on wireless networks. In this 13-page buyer's guide, learn about the latest developments in wireless networks, the challenges of wireless local area networking, and how to deploy the 802.11ac Wave 2 wireless standard.
Posted: 08 Feb 2021 | Published: 10 Aug 2017
|
|
|
Edge Computing Essentials Drive Digital Operations
sponsored by Stratus
ANALYST REPORT:
Edge computing is the foundation for digital operations, enabling faster response times and addressing IoT scalability challenges. This analyst brief explores the essential elements of edge-native solutions and how they can unlock new capabilities for enterprises. Read the full report to learn more.
Posted: 08 Feb 2025 | Published: 08 Feb 2025
|
|
|
Planning Essentials 2025 Strategy
sponsored by NICE
WHITE PAPER:
Explore 10 essential CX trends for 2025, including the convergence of digital, AI, and customer insights. Learn how to elevate CX as a core business strategy, deploy AI-powered copilots, and unify inbound and outbound engagement. Read the full white paper to prepare your CX strategy for the future.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
|
How to Manage SAP User Accounts and Access Rights with Identity Manager
sponsored by One Identity
WHITE PAPER:
Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
Posted: 05 Jun 2024 | Published: 05 Jun 2024
|
|
|
Eyes on India: New age of flash storage boosts performance & efficiency
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As one of the forerunners in technology adoption, Indian enterprises have been keen to embrace emerging technologies such as AI, IoT and big data, driving an upsurge in storage requirements. In this e-guide, read more about India's storage market, the next frontier of storage technology and flash storage options from the top cloud providers.
Posted: 08 Feb 2021 | Published: 16 Nov 2020
|
|
|
4 Strategic Principles of Modern Web App and API Security
sponsored by Fastly
WHITE PAPER:
Explore 4 strategic principles for modern web app and API security. Learn how to secure applications in the cloud-native era, leverage intent-based security tools, ensure usability, and embrace a secure DevOps mindset. Read the full white paper to improve your security posture.
Posted: 25 Feb 2025 | Published: 25 Feb 2025
|
|
|
Flash hits the cloud while NVMe flash goes mainstream
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we will major on NVMe, the stance towards it of the big five storage makers and the varying architectures marketed to the market. We also look at deploying NVMe in the enterprise and in particular for AI use cases. We also look at contemporary scale-out NAS products and flash options offered by the key cloud providers.
Posted: 08 Feb 2021 | Published: 30 Oct 2019
|
|