DOS Protected Mode Interface White Papers

(View All Report Types)
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Cloud Native Application Protection Platforms
sponsored by Palo Alto Networks
EBOOK: This e-book explores cloud native application protection platforms (CNAPPs) and how they enable collaborative security across development, DevOps, and security teams. Learn how CNAPPs provide a holistic approach to securing cloud native applications from code to cloud. Discover the foundations of comprehensive cloud security.
Posted: 20 Dec 2024 | Published: 21 Dec 2024

Palo Alto Networks

Contact Center Buyer’s Guide
sponsored by 8x8, Inc.
EBOOK: In the modern business world, contact centers play a critical role in the customer experience. However, outdated legacy systems can have you running into some challenges. So, how can you meet service expectations while providing a better experience for all? Access this guide to learn more.
Posted: 05 Apr 2023 | Published: 05 Apr 2023

TOPICS:  .NET
8x8, Inc.

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Protect Kubernetes Environments with CN-Series Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: Kubernetes environments pose unique security challenges. Learn how the CN-Series firewall from Palo Alto Networks provides Layer 7 visibility and enforcement using native Kubernetes context to protect against known and unknown threats. Read the white paper to learn more.
Posted: 05 Nov 2024 | Published: 06 Nov 2024

Palo Alto Networks

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

Kubernetes Networking and Cilium
sponsored by Cisco
EBOOK: Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024

Cisco

ADP Global Payroll: protecting your data as your business grows (IN)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Atlassian Cloud Data Protection
sponsored by Atlassian
EBOOK: In most industries, the most important asset to an organization is data. The problem is that data is becoming more challenging to protect and secure, and this is no different in the cloud. If your data isn’t protected correctly, the cost of a breach can take down an entire organization. So, what are the challenges? Read on to find out more.
Posted: 22 Aug 2023 | Published: 22 Aug 2023

TOPICS:  .NET
Atlassian

ADP Global Payroll: protecting your data as your business grows (SG)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (PH)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (AU)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET
ADP

ADP Global Payroll: protecting your data as your business grows (HK)
sponsored by ADP
EBOOK: When expanding your organization overseas, it is critical to ensure that your data security is up to date, especially when it comes to your employees’ personal and payroll information. To do so, many have turned to payroll partners who can provide them with the tools and support they need. Browse this guide to learn more.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
ADP

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Symantec & Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 08 Feb 2021 | Published: 04 Nov 2016

Symantec & Blue Coat Systems

SonicWall Next-Generation Firewall Buyer’s Guide
sponsored by SonicWall
BUYER'S GUIDE: As enterprises embrace cloud, remote work, and new threats, next-generation firewalls (NGFWs) must evolve to provide robust security controls, performance, and management. Evaluate NGFW features like sandboxing, multi-instance, and threat intelligence to find the right fit for your network. Read the full Buyer's Guide to learn more.
Posted: 17 Dec 2024 | Published: 18 Dec 2024

SonicWall

Improve cyber resiliency and protect data from cyber ransomware threats by using an isolated vault, AI-based ML analytics software, and more
sponsored by Index Engines
WHITE PAPER: Improve cyber resilience and protect data from ransomware threats with Dell PowerProtect Cyber Recovery's isolated vault, AI-based analytics, and recovery capabilities. Download this white paper to learn how you can strengthen your data protection strategy.
Posted: 31 Oct 2024 | Published: 01 Nov 2024

Index Engines

Panda Adaptive Defense 360 Technologies
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In an era of sophisticated ransomware and increasingly frequent cyberattacks, MSPs need to make sure they have comprehensive security capabilities. Access this white paper to learn how Panda Adaptive Defense 360 offers a full protection stack including endpoint protection technology, zero-trust defense, and contextualized behavior detection.
Posted: 21 Jul 2021 | Published: 21 Jul 2021

WatchGuard Technologies, Inc.

Practical Zero Trust Implementing Protections for High-Value Data
sponsored by Zentera Systems Inc.
EBOOK: This e-book offers a model for implementing a Zero Trust security strategy to protect high-value data. Learn to apply Zero Trust principles like segmentation, identity-based access, and continuous monitoring to secure sensitive information. Download the e-book for practical examples and a software-based approach to Zero Trust.
Posted: 13 Sep 2024 | Published: 13 Sep 2024

Zentera Systems Inc.

The Definitive Guide To Container Security
sponsored by Palo Alto Networks
EBOOK: Securing container environments requires understanding tools and policies for protecting infrastructure, applications, and components. This guide explores container security across the lifecycle, from build to runtime, and offers a roadmap to prepare your environment and secure your containers. Read the full e-book to learn more.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks