Electronic File Transfer Access Method White Papers

(View All Report Types)
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

TeamViewer Tensor Secure Attended Access
sponsored by TeamViewer
PRODUCT OVERVIEW: As different as their industries may be, there is one thing that all manufacturers have in common: When a problem occurs, their customers expect quick support. That’s why many have begun connecting their products to provide instant remote support. Download this resource to learn more.
Posted: 08 Dec 2023 | Published: 09 Dec 2023

TOPICS:  .NET
TeamViewer

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 27 Mar 2024 | Published: 27 Mar 2024

XtelligentMedia Healthcare

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 03 Apr 2024 | Published: 04 Apr 2024

XtelligentMedia Healthcare

A Five-Step Roadmap to Building Your Mobility Strategy
sponsored by Zebra Technologies
WHITE PAPER: Electronic health record systems have become the industry standard for many patient care applications and processes. Yet caregivers at the patient’s bedside don’t always have immediate access to this critical information. View this report to access 5 critical steps to developing a clinical mobility strategy for your healthcare facility.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Zebra Technologies

TeamViewer Tensor Secure Attended Access
sponsored by TeamViewer
PRODUCT OVERVIEW: Discover how TeamViewer's Secure Attended Access feature enables instant remote support, reduces downtime, and increases customer satisfaction for OEMs and manufacturers. Learn more by reading the full solution brief.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

TeamViewer

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018

TechTarget ComputerWeekly.com

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

File Upload Security: The Missing Category for a Comprehensive Security Posture
sponsored by Deep Instinct
WHITE PAPER: Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
Posted: 25 Feb 2023 | Published: 25 Feb 2023

TOPICS:  .NET
Deep Instinct

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Understanding Today’s Threat Actors
sponsored by Fortinet, Inc.
WHITE PAPER: Discover insights on today's threat actors and how they gain access to corporate networks. Learn the most common tactics used to maintain access, conduct discovery, and exfiltrate data. Download the full report for tips on how to improve your security posture.
Posted: 28 Mar 2024 | Published: 28 Mar 2024

TOPICS:  .NET
Fortinet, Inc.

A Computer Weekly E-guide to NAS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TechTarget ComputerWeekly.com

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: This Analyst Report provides an overview of the Privileged Access Management (PAM) market, evaluating leading vendors and their solutions. It offers insights into the evolving landscape, focusing on cloud security, identity management, and advanced features. Read the full report to learn how to select the right PAM solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

Automated document management system tools transform workflows
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, we examine the components of a viable DMS and the technologies influencing its broader acceptance, how e-signatures are powering DM Simplementations, the differences between electronic and digital signatures, and the role of automated document management system tools in ensuring continuity for the new hybrid workforce.
Posted: 16 Dec 2021 | Published: 16 Dec 2021

TechTarget ComputerWeekly.com

CW Middle East Oct to Dec 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.
Posted: 08 Feb 2021 | Published: 12 Oct 2017

TechTarget ComputerWeekly.com

Zero Trust Network Access
sponsored by Akamai Technologies
ANALYST REPORT: The market for Zero Trust Network Access (ZTNA) solutions has undergone significant growth. Access this Leadership Compass report to see why Akamai was named a Leader in all four categories (Innovation, Product, Market, and Overall) and ensure you choose the right ZTNA for your needs.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Akamai Technologies

CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL
sponsored by TechTarget ComputerWeekly.com
EZINE: European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.
Posted: 08 Feb 2021 | Published: 01 Mar 2019

TechTarget ComputerWeekly.com

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

An Analysis of Attacker Activity through NDR, EDR, and NGFW Data
sponsored by Fortinet, Inc.
RESEARCH CONTENT: This white paper analyzes over 11 trillion network events to uncover the most common MITRE ATT&CK tactics and techniques used by attackers in 2023. It provides insights on C2, RAT malware, valid account abuse, and more to help security teams detect and respond to threats. Read the full white paper for comprehensive analysis.
Posted: 07 Oct 2024 | Published: 08 Oct 2024

Fortinet, Inc.

Centralized Remote Connectivity for State & Local Government
sponsored by TeamViewer
PRODUCT OVERVIEW: State and local governments have a vast array of services they need to support their constituents with. In this brief, learn how centralized remote IT connectivity helps you manage and maintain all of these critical services—without requiring additional staff or infrastructure.
Posted: 15 Dec 2023 | Published: 15 Dec 2023

TOPICS:  .NET
TeamViewer

Computer Weekly – 17 September 2024: The pillars of AI strategy
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Currys about the electronics retailer's AI strategy. We examine how China has become a leader in open source software – and what it means for the rest of the world. And we look at how AI is supporting networking alongside how to implement networking to support AI. Read the issue now.
Posted: 16 Sep 2024 | Published: 17 Sep 2024

TechTarget ComputerWeekly.com