High Level Data Link Control Protocol White Papers

(View All Report Types)
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

The great IAM - time to modernise?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we offer a refresher in Identity and Access Management and highlight some of the trends that have an impact on it. Take a look at why IAM is a core building block for GDPR compliance and at the same time, a vital business concern. Is IAM really the way forward? And if so, is it time to modernise your strategy?
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER: How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023

TOPICS:  .NET
HighByte

Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019

TechTarget ComputerWeekly.com

Powerful, Application-aware Investigation Tools.
sponsored by Endace
DATA SHEET: When you’re investigating a security incident, you want to eliminate any guesswork. EndaceVision, a browser-based investigation GUI, can help you do so. Learn all about the product in this data sheet.
Posted: 28 Mar 2023 | Published: 28 Mar 2023

TOPICS:  .NET
Endace

Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

Cloudflare Security Brief
sponsored by Cloudflare
EBOOK: Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
Posted: 19 Sep 2024 | Published: 19 Sep 2024

TOPICS:  .NET
Cloudflare

Simplify desktop management and reduce costs by up to 40%
sponsored by DellEMC and Intel®
EGUIDE: This white paper goes over what organizations have to gain - and lose - from virtual desktop technology.
Posted: 08 Feb 2021 | Published: 27 Dec 2012

DellEMC and Intel®

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

IoT Today: Building a Secure, Scalable Wireless WAN for Devices
sponsored by Cradlepoint
WHITE PAPER: As they deploy more IoT devices, organizations are challenged to figure out how to secure them. To unlock a quick guide to IoT security, dig into this white paper.
Posted: 27 Apr 2024 | Published: 27 Apr 2024

TOPICS:  .NET
Cradlepoint

Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018

TOPICS:  Telephones | VoIP
TechTarget ComputerWeekly.com

CVE-2021-2035 and RDBMS Scheduler Security
sponsored by Spinnaker Support
RESEARCH CONTENT: This white paper analyzes CVE-2021-2035 in Oracle Database's Scheduler. It discusses the attack surface, needed privileges, and defense strategies like limiting scheduler access, setting up SQLNet, and encrypting credentials. Discover how to protect your Oracle Database by reading the complete paper.
Posted: 04 Jun 2024 | Published: 04 Jun 2024

TOPICS:  .NET
Spinnaker Support

How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK: Cyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
Posted: 18 Nov 2024 | Published: 18 Nov 2024

Dell Technologies and Intel

How To Combat Modern Cyber Threats
sponsored by Dell Technologies and Intel
EBOOK: Cyberattacks are inevitable and are growing in volume and sophistication. Endpoint devices, networks and cloud environments have become key targets. This e-book offers IT and security decision-makers guidance on the elements needed for the most effective endpoint defense amidst this evolving threat landscape.
Posted: 18 Nov 2024 | Published: 18 Nov 2024

Dell Technologies and Intel

2024 Comcast Business Cybersecurity Threat Report
sponsored by Comcast Business
RESEARCH CONTENT: Combining publicly available data with the 29 billion cybersecurity events Comcast Business detected across their base of security customers in 2023, this report provides a wide-angle view of the global threat landscape. Read now to learn more.
Posted: 19 Nov 2024 | Published: 19 Nov 2024

TOPICS:  .NET
Comcast Business

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020

TechTarget ComputerWeekly.com

Turning Local Government Cybersecurity Challenges into Opportunities
sponsored by Schneider Electric
WHITE PAPER: In this eBook, discover the top three cybersecurity challenges of state and local government and learn how their IT departments can benefit from a partner who can break down these barriers and turn cybersecurity challenges into opportunities.
Posted: 27 Feb 2024 | Published: 27 Feb 2024

TOPICS:  .NET
Schneider Electric

Voice Network Vulnerabilities in the Enterprise: How to Address Them
sponsored by Ribbon Communications
WHITE PAPER: As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.
Posted: 31 Jan 2024 | Published: 31 Jan 2024

TOPICS:  .NET
Ribbon Communications

CDN Buyer’s Guide
sponsored by Fastly
BUYER'S GUIDE: Many CDNs offer the same types of services, but they're not all the same. This Buyer’s Guide can help you distinguish the best from the rest. Download it now to explore the key factors to consider when selecting a CDN, essential questions to ask to ensure you get the most out of your CDN, and more.
Posted: 03 Oct 2024 | Published: 03 Oct 2024

Fastly

Navigating Network Failover
sponsored by Cradlepoint
PRODUCT OVERVIEW: Having a strategy in place for WAN failover can help mitigate risks by providing automatic, seamless transitions to backup connectivity when the primary link fails. Read on here to discover how to navigate network failover with 5G and LTE, as well as assistance from Cradlepoint.
Posted: 26 Mar 2024 | Published: 26 Mar 2024

TOPICS:  .NET
Cradlepoint

A network automation roadmap to reap tech's best benefits
sponsored by TechTarget Networking
EBOOK: A network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
Posted: 09 Sep 2021 | Published: 06 Sep 2021

TechTarget Networking

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT: The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024

NOKIA

A Computer Weekly e-guide to WAN & applications services
sponsored by TechTarget ComputerWeekly.com
EGUIDE: One of the key technology trends of the last five years, if not longer, has been the migration from networks based on multiprotocol label switching (MPLS) to the more agile and affordable alternative, wide-area networking (WAN) technologies and in particular software-defined (SD-WAN).
Posted: 28 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to anti-ransomware
sponsored by TechTarget ComputerWeekly.com
EBOOK: The threat of ransomware looms large over business. In this 16-page buyer's guide, Computer Weekly looks at prevention methods, data defence and how to minimise the impact of a potential attack.
Posted: 12 Dec 2022 | Published: 12 Dec 2022

TechTarget ComputerWeekly.com