SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER:
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
How enterprise networks use WAN virtualization
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Virtualization is the backbone of network management in modern enterprises. Surprisingly, in most enterprises, virtualization came to the WAN last, but it arrived with enormous sophistication. SD-WAN is the most common form of WAN virtualization. But virtual WAN strategies are evolving to include software-defined perimeter and cloud concepts.
Posted: 01 Jul 2022 | Published: 01 Jul 2022
|
|
|
IGA Buyers Guide
sponsored by OpenText
BUYER'S GUIDE:
As digital transformation widens access to sensitive data, organizations must bolster identity governance. This guide covers assessing access control maturity, applying least-privilege principles, and automating workflows to protect digital assets. Discover how to enhance your identity governance strategy.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
How to Manage SAP User Accounts and Access Rights with Identity Manager
sponsored by One Identity
WHITE PAPER:
Learn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
Posted: 05 Jun 2024 | Published: 05 Jun 2024
|
|
|
Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER:
This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024
|
|
|
Towards more robust internetworks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 08 Feb 2021 | Published: 02 Feb 2017
|
|
|
Managing Data Bias, Privacy, And Drift: The Importance Of Holistic Data Management
sponsored by OpenText
EBOOK:
Discover how to effectively manage data bias, privacy, and drift in the age of data sprawl. Learn five strategic best practices to ensure comprehensive data oversight, foster trust, and drive data-driven outcomes. Read the full e-book to learn more.
Posted: 10 Oct 2024 | Published: 10 Oct 2024
|
|
|
The path ahead Virtualization on your timeline
sponsored by Dell Technologies
WHITE PAPER:
Virtualization is critical for adapting to market changes and scaling services. Learn how Dell Technologies can help you unlock the full power of your data with flexible, scalable virtualization solutions tailored to your needs. Read the full e-book to explore your options.
Posted: 04 Nov 2024 | Published: 05 Nov 2024
|
|
|
Computer Weekly - 15 February 2022: On a mission to track space junk
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to the space experts tracking orbital debris using graph database technology. We meet the startups taking very different approaches in trying to develop commercial quantum computers. And we ask why it's so difficult to build a data science team and how to overcome the challenges. Read the issue now.
Posted: 11 Feb 2022 | Published: 15 Feb 2022
|
|
|
Computer Weekly – 12 September 2017: IT transformation takes the lead at Dogs Trust
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the head of IT at Dogs Trust discusses their use of cloud computing and data analytics. We also look at the societal challenges of AI and investigate how to get a good deal on Office 365. Plus our buyer's guide checks out DevOps tools. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Sep 2017
|
|
|
The development of wired and wireless LANs in a hybrid work model
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|
|
Emerging Trends In Security Posture Management (SPM)
sponsored by OpenText
WHITE PAPER:
Explore the growing importance of security posture management (SPM) in today's digital landscape. Learn how proactive SPM can enhance cyber resilience by prioritizing risks, leveraging behavioral analytics, and automating security responses. Read the white paper to discover emerging SPM trends and use cases.
Posted: 09 Oct 2024 | Published: 09 Oct 2024
|
|
|
Cyber risks in maritime container terminals: Analysis of threats and simulation of impacts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security series explains why container terminals are vulnerable to cyber attacks, and recommends a technique for identifying and prioritising those vulnerabilities.
Posted: 08 Feb 2021 | Published: 15 Mar 2017
|
|
|
A Computer Weekly buyer's guide to continuous integration and continuous deployment
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
Posted: 08 Feb 2021 | Published: 17 Dec 2019
|
|
|
7 Reasons Rancher is the Enterprise Container Management Platform You Need
sponsored by SUSE
EBOOK:
Container adoption is surging, and Kubernetes has become the go-to for managing container workloads. Yet, Kubernetes' complexity at scale is daunting. This white paper delves into how Rancher simplifies Kubernetes deployment and management. Read the white paper for 7 reasons why you should consider Rancher for your container management.
Posted: 30 Apr 2024 | Published: 30 Apr 2024
|
|
|
Securing the Digital Frontier: Inside Dell and AMD’s Zero Trust Approach
sponsored by Dell Technologies & AMD
PRODUCT OVERVIEW:
Dell and AMD have created a cyber resilient architecture that utilizes a zero-trust strategy, embracing the idea that system components are vulnerable at each link in the chain and offering protection at every point. Download this product overview, which provides an analysis of how Dell and AMD's cooperative zero-trust can secure your business.
Posted: 12 Nov 2024 | Published: 12 Nov 2024
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Data governance more important now than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
Posted: 08 Feb 2021 | Published: 11 Jun 2019
|
|
|
The Modern Application Development Playbook
sponsored by Fastly
EBOOK:
Scaling, performance, and optimization represent big challenges in the development of modern applications. Serverless computing at the edge represents the first and only option that satisfies DevOps while allowing organizations to maintain the rapid pace of innovation. Download this eBook to learn more.
Posted: 01 Oct 2024 | Published: 02 Oct 2024
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
Futureproof – how to get your business ready for the next disruption
sponsored by TechTarget ComputerWeekly.com
BOOK:
This extract from the book, Futureproof – how to get your business ready for the next disruption, by Minter Dial, gives some invaluable career tips for IT and other professionals, looking to futureproof their careers.
Posted: 08 Feb 2021 | Published: 14 Dec 2017
|
|
|
Anatomy of an Attack
sponsored by JAMF
WHITE PAPER:
Explore the anatomy of a cyberattack through the seven phases of the cyber kill chain. Learn how to identify and defend against vulnerabilities that threat actors target. Download this white paper to strengthen your security posture and protect your organization.
Posted: 04 Sep 2024 | Published: 04 Sep 2024
|
|
|
A Computer Weekly buyer's guide to applications of next-generation networking
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses
Posted: 08 Feb 2021 | Published: 08 Jan 2019
|
|
|
Protect Your Attack Surface
sponsored by Cloudflare
EBOOK:
Explore "Everywhere Security" in our e-book to protect users, apps, and networks as the corporate perimeter fades. Learn to minimize the attack surface, prevent breaches, block lateral movement, and halt data theft. Secure your organization—read the full e-book.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|
|
A Computer Weekly Buyer's Guide to Microsoft Office 365
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.
Posted: 08 Feb 2021 | Published: 15 Nov 2017
|
|
|
An Integrated Approach to Managing Edge using GitOps, Fleet and Akri
sponsored by SUSE
WHITE PAPER:
This white paper provides an overview of how GitOps, Fleet, and Akri can help manage edge infrastructure at scale. This integrated approach automates deployments, reduces errors, and improves visibility across diverse edge environments. Read the full research content to learn more.
Posted: 01 May 2024 | Published: 01 May 2024
|
|