Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER:
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
11 top IoT online courses to boost your career
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Recent research revealed the increasing importance of IoT in industrial applications, predicting that investment in IoT will soon overtake main technologies such as cloud computing, big data analytics and next-generation security. In this infographic, we selected 11 options for learning about IoT, from introductory to advanced levels.
Posted: 28 Mar 2022 | Published: 28 Mar 2022
|
|
|
A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK:
A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
The Splunk Guide to SIEM Replacement
sponsored by Splunk
EBOOK:
Replacing a SIEM is a major decision for an organization. And now more than ever, best-in-class security operations require a modern SIEM solution that will power the SOC of the future. This e-book will help answer key questions on your SIEM replacement journey. Read on now to learn how you can get started.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Ensure FFIEC Compliance
sponsored by Redjack
WHITE PAPER:
Cybersecurity asset management addresses several key requirements found in the Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool and plays a crucial role in your compliance efforts. Download this white paper to learn which aspects of FFIEC guidelines cybersecurity asset management solutions address and how.
Posted: 02 Apr 2024 | Published: 02 Apr 2024
|
|
|
Supercharge Your Databricks Lakehouse
sponsored by Qlik
EBOOK:
With real-time data ingestion and analytics-ready data delivery, you can supercharge your Databricks Lakehouse. Read this e-book now to find out how you can automate your entire data pipeline to reduce risk, boost ROI, and free your data engineers.
Posted: 30 Jul 2024 | Published: 06 Aug 2024
|
|
|
Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
WHITE PAPER:
In this deep-diving white paper — designed for companies in the data center industry or wishing to report on their data center operations — discover why there 5 often-misunderstood categories for environmental sustainability reporting metrics that need to be at the core of your sustainability strategy.
Posted: 19 Mar 2024 | Published: 19 Mar 2024
|
|
|
Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
EBOOK:
To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.
Posted: 12 Mar 2024 | Published: 12 Mar 2024
|
|
|
Ebook - Content Synd - Zero Trust Explained: Ultimate Guide to Zero Trust Security
sponsored by StrongDM
EBOOK:
Download this ebook explore Zero Trust security, including its benefits, best practices, and common barriers to implementation. You’ll gain a deeper understanding of Zero Trust models like ZTAA and ZTNA and learn the tools and techniques you need to apply frictionless Zero Trust access control to your infrastructure.
Posted: 01 Feb 2022 | Published: 02 Feb 2022
|
|
|
Authentication After Passwords
sponsored by Okta
EBOOK:
The future of authentication is loginless. Learn how passwordless and continuous authentication can enhance security, reduce friction, and build customer trust. Download the e-book to explore this transformative identity management approach.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
|
CMMC 2.0 for MSPs: Everything You Need To Know
sponsored by Scalepad Software
WHITE PAPER:
The Cybersecurity Maturity Model Certification (CMMC) framework is designed to support and guide MSPs working with the US Department of Defense. This white paper presents a guide to the CMMC, breaking down the essential information so that you can navigate its more complex features. Read on to learn more.
Posted: 15 Apr 2024 | Published: 16 Apr 2024
|
|
|
Data Modeling Guidebook
sponsored by HighByte
EBOOK:
Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022
|
|
|
Session Border Controllers
sponsored by Ribbon Communications
EBOOK:
What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
Stand Out With A Winning IT Asset Management Strategy
sponsored by ServiceNow
EBOOK:
Every year, companies waste far too much money on software, hardware, and cloud resources. In fact, 66% of organizations reported having a plethora of duplicate hardware and software. Learn what it takes to develop a winning technology asset management strategy in this ServiceNow e-book.
Posted: 08 Jul 2022 | Published: 08 Jul 2022
|
|
|
2023 Health System Sector Industry Trends
sponsored by The Advisory Board
RESEARCH CONTENT:
In the wake of the worst financial year in recent memory, 2023 was a story of resilience for health systems. On top of that, the entrance of generative AI tools (some valuable, others not), along with value-based care, has encouraged caution when investing in hyped healthcare technology. Learn about these trends, and 7 others, in this report.
Posted: 10 Apr 2024 | Published: 11 Apr 2024
|
|
|
Computer Weekly – 21 August 2018: Delivering the potential of the internet of things
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we hear from early adopters of internet of things technologies about how to deliver on the potential of IoT. We examine strategies for combining hyper-converged infrastructure and cloud storage to best effect. And we find out how the UK government intends to use data to improve Britain's railways. Read the issue now.
Posted: 08 Feb 2021 | Published: 17 Aug 2018
|
|
|
A Guide for Identity Governance and Administration Programs
sponsored by One Identity
WHITE PAPER:
Organizations are rapidly accruing new digital identities, leading to a demand for more sophisticated identity security. This white paper presents a guide for IGA programs, showing you how to implement an IGA program from beginning to end. Download the guide now to learn more.
Posted: 01 Jun 2024 | Published: 01 Jun 2024
|
|
|
Benefits of shifting from traditional to condition-based maintenance in electrical distribution equipment
sponsored by Schneider Electric
WHITE PAPER:
Explore in this white paper the power of condition-based maintenance and how it addresses modern electrical infrastructure reliability and availability requirements.
Posted: 15 Sep 2023 | Published: 15 Sep 2023
|
|
|
The Path To Data Excellence: The Alation Data Maturity Model
sponsored by Alation
WHITE PAPER:
How do “data mature” firms become that way, and how can others do the same? This white paper introduces a data maturity model to provide a common framework for benchmarking and advancing data management capabilities. Read on to learn how you can drive success on your own data maturity journey.
Posted: 13 Oct 2023 | Published: 13 Oct 2023
|
|
|
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
Posted: 08 Feb 2021 | Published: 13 Sep 2017
|
|
|
StorPool Storage: Ultra-fast, Reliable, Linearly Scalable Primary Storage Platform
sponsored by StorPool
PRODUCT OVERVIEW:
Dual-controller, shared-disk storage arrays have long been the default for storage systems. However, this paradigm is quickly proving unsuitable. To meet your performance and data requirements, consider the efficacy of solutions like StorPool Storage, in this product overview. Read on to tap into the top 8 benefits.
Posted: 11 Jul 2024 | Published: 11 Jul 2024
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Computer Weekly buyer's guide to customer insight
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at how firms adapt to new behaviors, as well as utilize deep learning to gain better insights and use intelligent analytics apps to enhance interactions.
Posted: 08 Feb 2021 | Published: 20 Mar 2018
|
|
|
Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER:
As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|