Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022
|
|
|
Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022
|
|
|
API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020
|
|
|
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
sponsored by Cisco
EBOOK:
Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
VoIP has never lost its voice: How to get the most out of your business communications
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
Posted: 06 Jul 2022 | Published: 06 Jul 2022
|
|
|
API Security Solution Evaluation Guide
sponsored by F5 Inc.
WHITE PAPER:
Today, the efficiencies gained from APIs are overshadowed by the risk introduced to an IT enterprise. This e-book takes a realistic look at what buyers of API security solutions should look for when performing a product evaluation, helping you find the API security solution that’s right for your organization’s needs. Download now to learn more.
Posted: 09 Jul 2024 | Published: 10 Jul 2024
|
|
|
RANSOMWARE PREVENTION ESSENTIAL GUIDE
sponsored by Checkpoint Software Technologies
WHITE PAPER:
Ransomware is a growing threat, with attacks costing millions. This guide provides practical tips to protect your business, including using zero-trust network access and secure web gateways. Learn how to build a secure corporate network and prevent ransomware attacks. Read the white paper to learn more.
Posted: 07 May 2024 | Published: 07 May 2024
|
|
|
Kubernetes Networking and Cilium
sponsored by Cisco
EBOOK:
Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK:
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016
|
|
|
Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022
|
|
|
The Buyer’s Guide to SASE Use Cases
sponsored by Cloudflare
WHITE PAPER:
If you are responsible for your organization’s digital modernization strategy, optimizing IT costs, delivering highly-performant and secure modern networks, or improving threat resilience, read The Buyer’s Guide to SASE Use Cases now.
Posted: 25 Sep 2024 | Published: 25 Sep 2024
|
|
|
A Computer Weekly buyer's guide to cloud-native architectures
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud-native architectures are seen as the future for businesses. In this 16-page buyer's guide, Computer Weekly looks at the influence of DevOps and microservices-based technology, the continued importance of security in containers for software development and the suitability of Microsoft Azure for deploying cloud-native applications
Posted: 08 Feb 2021 | Published: 20 Nov 2018
|
|
|
Computer Weekly Buyer's Guide to SD-WAN services
sponsored by TechTarget ComputerWeekly.com
EBOOK:
In this 14-page buyer's guide, Computer Weekly looks at howSD-WAN effectively removes telcos' lock-in, the ways hybrid deployment hinges on the network, and the flexibility demanded by cloud-based workloads.
Posted: 08 Feb 2021 | Published: 11 Jan 2018
|
|
|
A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019
|
|
|
Taming the Microservices, Containers, and Governance Beast
sponsored by Apcera
EGUIDE:
What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.
Posted: 08 Feb 2021 | Published: 28 Apr 2017
|
All resources sponsored by Apcera
|
|
How to prepare your network for IoT data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide outlines how business requirements will affect your IoT network build, takes a deep dive into specific IoT network architecture and explores IoT topology options.
Posted: 08 Feb 2021 | Published: 03 Oct 2019
|
|
|
Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019
|
|
|
Omdia Universe: Email Security, 2024
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
Email is notoriously susceptible to attacks, making email security a continuing necessity for organizations. In order to make sense of a crowded and complex market, this Omnia Universe report breaks down the most important information about the landscape as a whole, as well as leading vendors. Read on to learn more.
Posted: 07 May 2024 | Published: 07 May 2024
|
|
|
30 top edge computing companies to watch in 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
With the amount of data organizations are generating today, IT leaders should consider edge computing technologies to keep all that data closer to the edge. In this infographic, we point out 30 vendors that are investing heavily in edge technologies to help organisations as they build edge computing ecosystems.
Posted: 18 Jan 2022 | Published: 18 Jan 2022
|
|
|
Modernizing Security: Proactive PAM Solutions for Today
sponsored by One Identity
WHITE PAPER:
In every enterprise IT environment, privileged accounts are instrumental in empowering administrators to manage the system effectively. However, the inherent risks associated with granting privileged access, as underscored in many of today's headlines, raise significant concerns for any organization, regardless of size or industry.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|
|
WAN as a Service
sponsored by Cloudflare
PRODUCT OVERVIEW:
Remote work is in full effect, and the internet has supplanted the corporate network. Magic WAN simplifies network connectivity from branch sites, multi-cloud VPCs, or data centers to the Cloudflare One SASE platform. Download this overview to learn more.
Posted: 27 Nov 2024 | Published: 12 Dec 2023
|
|
|
What is AWS? The ultimate guide to Amazon Web Services
sponsored by TechTarget Cloud Computing
EGUIDE:
What is Amazon Web Services? Find out in TechTarget's guide. Learn about AWS's key services, benefits, pricing, and real-world use cases to see how it drives scalability and innovation. Perfect for anyone looking to expand their cloud strategy.
Posted: 06 Nov 2024 | Published: 06 Nov 2024
|
|
|
Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022
|
|
|
Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021
|
|
|
Secure Email - Market Quadrant 2024
sponsored by Fortra
ANALYST REPORT:
The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|