Component Object Request Broker Architecture White Papers

(View All Report Types)
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte

Atlassian Cloud Architecture And Operational Practices
sponsored by Atlassian
WHITE PAPER: This white paper explores Atlassian's cloud architecture and operational practices, including their use of AWS, availability zones, data backups, and security controls. Read on now to learn how Atlassian ensures tenant separation and data encryption to safeguard customer data in the cloud.
Posted: 24 Oct 2024 | Published: 24 Oct 2024

Atlassian

HighByte Intelligence Hub version 3.2: A complete UNS and data engineering toolset
sponsored by HighByte
WHITE PAPER: In this white paper, you’ll discover a software solution designed to provide organizations will all the necessary components to build and manage a Unified Namespace (UNS). Read on to learn how you can maximize the value and accessibility of your industrial data.
Posted: 22 Dec 2023 | Published: 22 Dec 2023

TOPICS:  .NET
HighByte

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018

TechTarget ComputerWeekly.com

Computer Weekly – 10 December 2024: On the road to change at Aston Martin
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
Posted: 10 Dec 2024 | Published: 10 Dec 2024

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Oct 2019

TechTarget ComputerWeekly.com

The Buyer’s Guide to SASE Use Cases
sponsored by Cloudflare
WHITE PAPER: If you are responsible for your organization’s digital modernization strategy, optimizing IT costs, delivering highly-performant and secure modern networks, or improving threat resilience, read The Buyer’s Guide to SASE Use Cases now.
Posted: 25 Sep 2024 | Published: 25 Sep 2024

TOPICS:  .NET
Cloudflare

Generative AI in the Enterprise with AMD Accelerators
sponsored by Dell Technologies & AMD
WHITE PAPER: How can you ensure your organization is leveraging GenAI to the best of its abilities. This design guide describes the architecture and design of the Dell Validated Design for Generative AI with AMD accelerators. Read now to learn more. Dell PowerEdge server with AMD Instinct™ Accelerators.
Posted: 13 Nov 2024 | Published: 13 Nov 2024

Dell Technologies & AMD

Solution Brief
sponsored by HighByte
PRODUCT OVERVIEW: HighByte Intelligence Hub is an Industrial DataOps software solution that accelerates the use of operational data by contextualizing, standardizing, and securing information. Read the solution brief to learn how to deliver trusted, ready-to-use data across your business with this solution.
Posted: 21 Dec 2023 | Published: 21 Dec 2023

TOPICS:  .NET
HighByte

The Director's Guide to Observability: Leveraging OpenTelemetry in Complex Systems
sponsored by Honeycomb
WHITE PAPER: Observability is key to managing modern cloud-native systems' complexity. This whitepaper examines observability's building blocks: telemetry data, context-aware data stores, and observability workflows. Discover how OpenTelemetry aids in creating an effective observability practice. Read the full whitepaper.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Honeycomb

Jargon buster guide to hybrid cloud storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster guide we bring you definitions for the key concepts in hybrid cloud storage plus in-depth articles on hybrid cloud file and object storage, how to use the cloud as a storage tier and the key decision points when it comes to private cloud vs hybrid cloud.
Posted: 08 Feb 2021 | Published: 24 Jul 2018

TechTarget ComputerWeekly.com

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Symantec & Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 08 Feb 2021 | Published: 04 Nov 2016

Symantec & Blue Coat Systems

Top 10 storage stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.
Posted: 08 Feb 2021 | Published: 28 Jan 2020

TechTarget ComputerWeekly.com

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

The ultimate SASE buying guide key considerations for today’s buying teams
sponsored by Windstream Enterprise
EBOOK: This detailed SASE buying guide outlines key considerations for today's buying teams, including SASE components, market trends, benefits and the purchasing process. Learn how SASE can secure your network and workforce. Read the full guide.
Posted: 27 Jun 2024 | Published: 01 Jul 2024

Windstream Enterprise

Building a Resilient Cyber Security Culture in the Finance Sector
sponsored by Fortra
EBOOK: Cyber threats pose significant risks to the finance sector, with data breaches, ransomware, and social engineering attacks causing financial and reputational damage. This e-book explains the risks, addresses objections, and provides tips to build a cyber security-focused culture. Read the full e-book to fortify your organization's defenses.
Posted: 19 Dec 2024 | Published: 19 Dec 2024

Fortra

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Architectural Design Decisions Directly Impact IT Agility For Pure Storage Flasharray And Flashblade Users
sponsored by Pure Storage
WHITE PAPER: Across the enterprise storage ecosystem, all-flash arrays (AFAs) have grown in popularity. Yet, this IDC white paper notes, "not all AFAs are created equally"; the architecture of an AFA will determine its usability, manageability and sustainability, impacting IT agility. For a deep dive into AFA obstacles and opportunities, continue on.
Posted: 04 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET
Pure Storage

A Computer Weekly Buyer's Guide to Containers and Microservices
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

The Definitive Guide To Container Security
sponsored by Palo Alto Networks
EBOOK: Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks

Cloud-Native Meets Hybrid Cloud: A Strategy Guide
sponsored by Red Hat
EBOOK: The importance of IT systems is already clear. What isn’t as well known is the struggle IT teams face in trying to keep systems functional and secure while also finding ways to evolve current architecture to accommodate for innovation and improvements to business offerings. Read on to learn about an architecture that solves this challenge.
Posted: 18 Apr 2024 | Published: 18 Apr 2024

TOPICS:  .NET
Red Hat

Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020

TechTarget ComputerWeekly.com

IT4IT for Managing the Business of IT
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: IT4IT™ for Managing the Business of IT – A Management Guide, from The Open Group, provides best practice advice and focuses on the data and automated workflows needed to manage IT services in a lean, agile and business-focused way.
Posted: 08 Feb 2021 | Published: 26 May 2016

TechTarget ComputerWeekly.com