Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Data Modeling Guidebook
sponsored by HighByte
EBOOK:
Digital transformation is providing an unprecedented amount of predictive insights, but making the best use of this data can be daunting. Check out HighByte’s e-book to gain a better understanding of how data modeling works, what it looks like, how it works with existing standards, and to gather tips on how to establish a data modeling strategy.
Posted: 04 Apr 2022 | Published: 04 Apr 2022
|
|
|
Strengthen Data Pipeline Orchestration.
sponsored by BMC Software
WHITE PAPER:
Orchestrate data pipelines with Control-M's file transfer capabilities. Securely manage external file transfers, ensure compliance, and provide a seamless user experience. Learn how Control-M can streamline your data workflows in this white paper.
Posted: 04 Dec 2024 | Published: 09 Dec 2024
|
|
|
2024 Domain Security Report
sponsored by CSC
RESEARCH CONTENT:
The 2024 Domain Security Report analyzes the domain security posture of the Forbes Global 2000 companies. It highlights key trends, including rising DMARC adoption and low registry lock usage. The report offers insights to improve domain security and protect against cyber threats. Download the full report to learn more.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
How to Defend Against Look-Alike Domain Threats
sponsored by Fortra
WHITE PAPER:
This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Passwordless Authentication for Consumers: Securing Fast Business Online
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass provides an in-depth overview of the passwordless authentication market, analyzing the leading vendors and their solutions. It covers key capabilities, delivery models, and market trends to help organizations select the best passwordless authentication solution for their needs. Read the full report to learn more.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Identity Governance and Administration
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass evaluates 30 IGA vendors and identifies the Overall Leaders as Saviynt, EmpowerID, SailPoint, IBM, and Ping Identity. It highlights key trends like leveraging AI/ML for identity analytics and automation. Read the full report to assess the right IGA solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
Passwordless Authentication for Enterprises
sponsored by One Identity
ANALYST REPORT:
This Leadership Compass from KuppingerCole evaluates passwordless authentication solutions for enterprises, covering market analysis, vendor assessments, and key features. Download the report to learn how you can secure remote access and build user trust with passwordless authentication.
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
CVE-2021-2035 and RDBMS Scheduler Security
sponsored by Spinnaker Support
RESEARCH CONTENT:
This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
Posted: 04 Jun 2024 | Published: 04 Jun 2024
|
|
|
Zscaler ThreatLabz 2024 Phishing Report
sponsored by Zscaler
RESEARCH CONTENT:
Zscaler's Phishing Report analyzes the surge in AI-fueled phishing attacks, including vishing, deepfakes, and browser-in-the-browser tactics. Discover the latest phishing trends, targeted industries, and effective security measures to stay ahead of this evolving threat. Read the full report.
Posted: 13 Aug 2024 | Published: 13 Aug 2024
|
|
|
Inside Fortra’s Data Science: Advanced Email Threat Detection with Machine Learning
sponsored by Fortra
WHITE PAPER:
This white paper explains how advanced machine learning techniques can accurately detect email impersonation and social engineering threats that bypass traditional security controls. Learn how Fortra's data science approach provides comprehensive email protection. Read the full white paper.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
Simplify Complexity with BMC Helix Enterprise Service Management
sponsored by BMC Software
WHITE PAPER:
Enterprise service management (ESM) extends IT service management best practices to non-IT lines of business. BMC Helix ESM simplifies complexity with intelligent automation, AI/ML, and unified DevOps tooling. Learn how to fuel employee productivity and deliver elevated experiences across your organization. Read the white paper.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Build vs Buy eBook
sponsored by PatientIQ
EBOOK:
Launching an integrated outcomes program requires seamless integration of EHR modules, IT systems, and clinical workflows. This e-book outlines the technical requirements, workflow engine, and population health management capabilities needed to successfully implement an effective outcomes program. Read the full e-book to learn more.
Posted: 29 Oct 2024 | Published: 23 Oct 2024
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024
|
|
|
The Secure Coding Handbook
sponsored by Veracode
EBOOK:
This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.
Posted: 06 Jun 2023 | Published: 06 Jun 2023
|
|
|
From Data to Decision: Increasing AI Productivity with SAS Viya
sponsored by SAS
WHITE PAPER:
This study examines how SAS Viya can increase productivity throughout the data and AI life cycle, including 16x faster data engineering, 3.5x faster data science, and 4.5x faster MLOps. Read the full white paper to learn how SAS Viya can help your organization make faster, more informed decisions.
Posted: 05 Nov 2024 | Published: 06 Nov 2024
|
|
|
Kubernetes Patterns Reusable Elements For Designing Cloud Native Applications
sponsored by Red Hat
EBOOK:
This exhaustive O'Reilly e-book aims to help developers discover and learn about the most common patterns for creating cloud-native applications with Kubernetes. Read the book now, or save it for reference material in a pinch.
Posted: 16 Apr 2024 | Published: 16 Apr 2024
|
|
|
Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020
|
|
|
Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020
|
|
|
Computer Weekly - 10-16 September 2019: A tech boost for social care
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this issue, we explore how local authorities across the UK have been looking at assistive technologies, ranging from collaborative robots to voice assistants, to support delivery of adult social care services. We also look into the ramifica-tions of HMRC targeting 1,500 GlaxoSmithKline IT con-tractors.
Posted: 08 Feb 2021 | Published: 10 Sep 2019
|
|