Using Veritas Provisioning Manager in Multiple Site Environments: Issues, Evaluation, Recommendations
sponsored by Symantec Corporation
WHITE PAPER:
Server provisioning can be transformed by the Veritas Provisional Manager, but many users stumble when trying to implement the Provisional Manager across multiple sites. Learn the considerations that should be evaluated prior to implementation.
Posted: 05 Dec 2006 | Published: 01 Mar 2006
|
|
|
7 Things Every System Administrator Should Know about OpenSSH
sponsored by Global Knowledge
WHITE PAPER:
This paper will focus on the OpenSSH implementation, which was initially developed as part of the OpenBSD project and is installed by default on most modern BSD and Linux-based operating systems, including Red Hat Enterprise Linux and Fedora.
Posted: 10 Dec 2008 | Published: 10 Dec 2008
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
IT Project: Internet of Things
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.
Posted: 08 Feb 2021 | Published: 19 Aug 2016
|
|
|
Infographic: Four emerging data integration trends
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
To build up an effective data and analytics architecture, enterprises should look at leveraging new approaches in data integration. In this infographic, we take a look at four emerging data technologies to consider for future data integration projects.
Posted: 01 Mar 2022 | Published: 01 Mar 2022
|
|
|
SAP GRC Framework Integration with One Identity Manager
sponsored by One Identity
WHITE PAPER:
Built in line with the SAP governance risk and compliance (GRC) Framework, One Identity Manager enables organizations to maintain a complete picture of all deployed and connected systems by reading and writing to the connected systems via connectors. Download the white paper to learn more about One Identity Manager.
Posted: 30 May 2024 | Published: 30 May 2024
|
|
|
Digital Pioneer in Machine Tool Manufacturing Leverages AWS for Seamless Operations
sponsored by AllCloud
CASE STUDY:
Machine tool manufacturer Schwäbische Werkzeugmaschinen GmbH (SW) completed a mammoth migration project to AWS, enabling them to utilize optimized serverless apps and a seamless infrastructure as a service. Explore the details of the case study.
Posted: 24 May 2023 | Published: 24 May 2023
|
|
|
Getting To The Ground Truth With Gravwell Packet Capture
sponsored by Gravwell
WHITE PAPER:
Explore how to effectively capture and analyze network packets at scale in OT environments. Learn how to accelerate queries, extract valuable insights, and export packet data for further analysis. Read the full white paper to discover the power of packet capture at scale.
Posted: 16 Oct 2024 | Published: 21 Oct 2024
|
All resources sponsored by Gravwell
|
|
The Edge Advantage
sponsored by Fastly
EBOOK:
Interest in edge computing is growing rapidly, driven by accelerated digital transformation efforts. But what exactly is edge computing, and how can you best leverage the power of this technology? In this e-book, unlock a guide to edge computing and its use cases.
Posted: 05 Oct 2024 | Published: 05 Oct 2024
|
|
|
The Modern Application Development Playbook
sponsored by Fastly
EBOOK:
Scaling, performance, and optimization represent big challenges in the development of modern applications. Serverless computing at the edge represents the first and only option that satisfies DevOps while allowing organizations to maintain the rapid pace of innovation. Download this eBook to learn more.
Posted: 01 Oct 2024 | Published: 02 Oct 2024
|
|
|
Navigating Agentic AI Reasoning: ReAct vs ReWOO
sponsored by AWS & Source Allies
WHITE PAPER:
Explore the differences between two popular agentic AI reasoning approaches - ReAct and ReWOO. Discover how these methodologies can optimize the autonomy and efficiency of your AI solutions. Read the white paper to learn more.
Posted: 21 Oct 2024 | Published: 21 Oct 2024
|
|
|
Decoupled Applications and Composable Web Architectures
sponsored by Storyblok GmbH
WHITE PAPER:
As organizations continue to adopt and develop their cloud technology, many are focusing on updating their web architectures and applications from monolithic software to something more composable. However, this is easier said than done. Browse this report to learn more.
Posted: 19 Oct 2023 | Published: 19 Oct 2023
|
|
|
Safeguard Enables Convenient Secrets Management for DevOps
sponsored by One Identity
WHITE PAPER:
This white paper explores strategies for integrating DevOps with privileged access management (PAM) to tackle security challenges. It covers using vaulting technologies, fostering collaboration between security and development teams, and embedding security into DevOps workflows. Read the paper to learn how to bridge the gap between DevOps and PAM.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Kanverse “Zero Touch” - AP Invoice Automation (APIA): Product Datasheet
sponsored by Kanverse.ai
PRODUCT OVERVIEW:
Kanverse "Zero Touch" AP Invoice Automation streamlines document processing with AI-powered classification, data extraction, and validation. Access this white paper to learn how you can reduce errors, increase efficiency, and secure your AP workflows.
Posted: 24 Oct 2024 | Published: 25 Oct 2024
|
|
|
Securing Identities Across the Software Supply Chain and Development Environments
sponsored by CyberArk
WHITE PAPER:
This whitepaper addresses questions raised by security leaders that want to better understand their organization’s development environments, the risks development tools expose and the best practices and approaches for securing them, across the software supply chain. Download now to learn more.
Posted: 25 Sep 2024 | Published: 25 Sep 2024
|
|
|
Key Considerations for Securing Different Non-human Identities
sponsored by CyberArk
EBOOK:
Today's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
Posted: 31 May 2024 | Published: 21 Aug 2024
|
|
|
Protect Against the OWASP Top 10
sponsored by F5 Inc.
EBOOK:
The OWASP Top 10 outlines the most serious risks to web applications, with broken access control now the top threat. Learn how to mitigate these risks and protect your applications with F5 Distributed Cloud Web App and API Protection. Read the full e-book for comprehensive insights.
Posted: 04 Sep 2024 | Published: 05 Sep 2024
|
|
|
Transforming Manufacturing for the Digital Age
sponsored by Zebra Technologies
EBOOK:
Dive into a five-step guide to transform your manufacturing operations with smart, tech-forward strategies that modernize processes and reduce costs.
Posted: 26 Apr 2024 | Published: 27 Apr 2024
|
|
|
The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT:
Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024
|
|
|
How OpenTelemetry and Semantic Telemetry Will Reshape Observability
sponsored by Honeycomb
WHITE PAPER:
This white paper explores how OpenTelemetry and semantic telemetry are reshaping observability. It discusses the challenges of traditional telemetry, the benefits of semantic data, and how OpenTelemetry addresses the tradeoffs in observability. Read the full white paper to learn how these innovations can transform your observability practices.
Posted: 17 Sep 2024 | Published: 17 Sep 2024
|
|
|
Building An Effective Enterprise API Security Strategy With A Plan-First, Product-Second Approach
sponsored by Software AG
WHITE PAPER:
API security is vital due to frequent attacks. This white paper details building a robust API security strategy with an API Gateway and Specification. It discusses vulnerabilities, a proactive approach, and utilizing an open standards ecosystem. Access the full paper for a thorough API security plan.
Posted: 17 Jul 2024 | Published: 17 Jul 2024
|
|
|
Building An Effective Enterprise API Security Strategy With A Plan-First, Product-Second Approach
sponsored by webMethods + StreamSets
WHITE PAPER:
API security is vital due to frequent attacks. This white paper details building a robust API security strategy with an API Gateway and Specification. It discusses vulnerabilities, a proactive approach, and utilizing an open standards ecosystem. Access the full paper for a thorough API security plan.
Posted: 15 Aug 2024 | Published: 15 Aug 2024
|
|
|
Next-Generation Transportation Mobility
sponsored by Zebra Technologies
EBOOK:
Changing customer expectations, the rise of electric vehicles (EVs), and unexpected global supply chain disruptions are pressuring the automotive industry to achieve new levels of service and efficiency. Manufacturers are fast-tracking their digitalization efforts. Learn why this is a critical moment for the automotive sector.
Posted: 20 Apr 2024 | Published: 20 Apr 2024
|
|
|
Definitive Guide To Data Quality
sponsored by Qlik
WHITE PAPER:
This comprehensive guide explores factors that contribute to creating high-quality data and offers guidance on how enterprises can ensure their data meets high standards. Download the white paper now to learn how you can prioritize data quality and unlock its full potential.
Posted: 30 Jul 2024 | Published: 12 Aug 2024
|
|
|
Zscaler ThreatLabz State of Encrypted Attacks Report
sponsored by Zscaler
RESEARCH CONTENT:
Encrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
From Blockchain to IoT, the latest tech trends in logistics
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Delivering physical products to a customer base that today, for many businesses, spans the globe is a huge industry in itself. In this e-guide we look at the technologies that the businesses that operate in the logistics sector are investing in. As the headline suggests, Blockchain and the Internet of Things technologies are amongst them.
Posted: 08 Feb 2021 | Published: 21 Nov 2019
|
|
|
Future-proofing the Data Center and Comparing 4 Types of SDS
sponsored by IBM
EGUIDE:
In this eGuide, find out how software defined storage (SDS) will become a key tool in future-proofing an infrastructure. In addition, learn the pros and cons of 4 types of SDS: hypervisor based SDS, hyper-converged infrastructure SDS, storage virtualization SDS and scale-out object and/or file SDS.
Posted: 08 Feb 2021 | Published: 21 Jul 2016
|
|
|
FStech & Red Hat Research Report AI In Financial Services: Trends, Strategies And Challenges
sponsored by Red Hat
RESEARCH CONTENT:
AI is transforming financial services, with applications in areas like trading, cybersecurity, and risk analysis. This research report explores AI adoption trends, challenges, and use cases. Read on now to learn how your organization can leverage AI to drive innovation and sustainability.
Posted: 04 Nov 2024 | Published: 07 Nov 2024
|
|