Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER:
Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024
|
|
|
Attack Surface Management
sponsored by Palo Alto Networks
EBOOK:
With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.
Posted: 07 Apr 2023 | Published: 08 Apr 2023
|
|
|
A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019
|
|
|
Strengthen Data Pipeline Orchestration.
sponsored by BMC Software
WHITE PAPER:
Orchestrate data pipelines with Control-M's file transfer capabilities. Securely manage external file transfers, ensure compliance, and provide a seamless user experience. Learn how Control-M can streamline your data workflows in this white paper.
Posted: 04 Dec 2024 | Published: 09 Dec 2024
|
|
|
A guide to evaluating ambient and AI clinical solutions
sponsored by Microsoft and Nuance
EBOOK:
As the ambient AI market heats up, healthcare organizations must evaluate vendors' experience, expertise, technology leadership, scalability, and support. Download this eBook to learn the critical factors to consider when selecting an AI clinical partner.
Posted: 24 Sep 2024 | Published: 18 Sep 2024
|
|
|
Computer Weekly – 19 July 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
Computer Weekly – 5 June 2018: The bumpy ride to digital transformation
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we look at the lessons to be learned from General Electric's bumpy ride to digital transformation. We assess the use of software-defined networking in corporate IT infrastructures. And we find out how Royal Bank of Scotland approaches digital and business innovation. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Jun 2018
|
|
|
Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
sponsored by TechTarget ComputerWeekly.com
EZINE:
Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
Posted: 08 Feb 2021 | Published: 26 Jun 2017
|
|
|
Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022
|
|
|
Making Sense of B2B Purchase Intent Data and Putting It to Use
sponsored by Informa TechTarget
EBOOK:
Simply adopting a CRM system doesn’t guarantee better customer relationships. The data you put into the system matters. In this e-book, Patricia Anton, founder of Anton Consulting, Inc. discusses how you can bring together data, human processes and technology to create a competitive advantage.
Posted: 07 Apr 2021 | Published: 07 Apr 2021
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
Data Modeling Guidebook
sponsored by HighByte
EBOOK:
Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022
|
|
|
CVE-2021-2035 and RDBMS Scheduler Security
sponsored by Spinnaker Support
RESEARCH CONTENT:
This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
Posted: 04 Jun 2024 | Published: 04 Jun 2024
|
|
|
How to Defend Against Look-Alike Domain Threats
sponsored by Fortra
WHITE PAPER:
This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
CW EMEA - May 2023: The future of work
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
Posted: 10 May 2023 | Published: 11 May 2023
|
|
|
Passwordless Authentication for Consumers: Securing Fast Business Online
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass provides an in-depth overview of the passwordless authentication market, analyzing the leading vendors and their solutions. It covers key capabilities, delivery models, and market trends to help organizations select the best passwordless authentication solution for their needs. Read the full report to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
How Passkeys Work
sponsored by Okta
WHITE PAPER:
Passkeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 11 Jul 2024
|
|
|
Kubernetes Traffic Engineering for Network Engineers: Cilium Best Practices
sponsored by Cisco
EBOOK:
Traffic engineering in Kubernetes optimizes network performance, security, and costs. This paper explores using Cilium, a leading cloud-native networking solution, for advanced traffic routing in Kubernetes. Learn techniques for managing traffic flows. Discover how to build a resilient, high-performance Kubernetes network.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Passwordless Authentication for Enterprises
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass from KuppingerCole evaluates passwordless authentication solutions for enterprises, covering market analysis, vendor assessments, and key features. Download the report to learn how you can secure remote access and build user trust with passwordless authentication.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
CW APAC, Sep 2021: Buyer's guide to robotic process automation
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this handbook, Computer Weekly looks at the adoption of robotic process automation in APAC and where the technology fits in the wider automation landscape
Posted: 16 Sep 2021 | Published: 16 Sep 2021
|
|
|
Simplify Complexity with BMC Helix Enterprise Service Management
sponsored by BMC Software
WHITE PAPER:
Enterprise service management (ESM) extends IT service management best practices to non-IT lines of business. BMC Helix ESM simplifies complexity with intelligent automation, AI/ML, and unified DevOps tooling. Learn how to fuel employee productivity and deliver elevated experiences across your organization. Read the white paper.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Top AI attack tactics and mitigations
sponsored by Amazon Web Services
WHITE PAPER:
Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
Posted: 12 Dec 2024 | Published: 06 Jan 2025
|
|
|
Top AI attack tactics and mitigations
sponsored by Amazon Web Services
WHITE PAPER:
Download this solution brief for a few examples of AI security breaches being perpetrated by attackers and the AI-powered mitigations offered by cyber vendors.
Posted: 21 Dec 2024 | Published: 06 Jan 2025
|
|